Synechron
200+ Interview Questions and Answers
Q1. What is concurrency and how did you achieved it in your projects ?
Concurrency is the ability of a program to execute multiple tasks simultaneously.
Achieved through multi-threading or asynchronous programming
Requires careful management of shared resources to avoid race conditions
Examples include implementing a chat application or processing multiple requests simultaneously
Q2. Types of call in cobol. What is file status 39. What is AICA in CICS. Why do we use cursor in Cobol+db2 program. What are some compiler options. What is the utility for bind. How would you dynamically read a vs...
read moreTechnical Lead interview questions on COBOL, DB2, and CICS
Types of call in COBOL
File status 39 indicates end-of-file reached
AICA is Abend-AID CICS Abend RSN (Reason) Code
Cursor is used to fetch rows from DB2 tables sequentially
Compiler options include OPTIMIZE, DEBUG, and LIST
BIND utility is used to bind DB2 programs to database
Dynamic VSAM file reading can be done using READNEXT function
-911 SQLCODE indicates deadlock or timeout error
Research organization before interview
Int...read more
Q3. find sum of all odd numbers in a list using stream?
Using Java stream, find the sum of all odd numbers in a list.
Use the filter() method to filter out the odd numbers from the list.
Use the mapToInt() method to convert the filtered numbers to integers.
Use the sum() method to calculate the sum of the filtered odd numbers.
Q4. Explain the usage of that particular design pattern
The design pattern is used to solve a specific problem in software development.
Design patterns are reusable solutions to common problems in software development.
They provide a standard way to solve a problem that can be adapted to different situations.
Examples of design patterns include Singleton, Factory, Observer, and Decorator.
Using design patterns can improve code quality, maintainability, and scalability.
Q5. how to remove duplicated form from array list?
To remove duplicates from an ArrayList of strings, use a HashSet to store unique elements.
Create a HashSet and add all elements from the ArrayList to it.
Create a new ArrayList and add all elements from the HashSet to it.
The new ArrayList will contain only unique elements.
Q6. How do you convert list to arraylist? And vice versa
To convert list to arraylist, use ArrayList constructor. To convert arraylist to list, use List constructor.
To convert list to arraylist, use ArrayList constructor and pass the list as parameter.
To convert arraylist to list, use List constructor and pass the arraylist as parameter.
Example: List
list = Arrays.asList("one", "two", "three"); ArrayList
arrayList = new ArrayList<>(list); Example: ArrayList
arrayList = new ArrayList<>(Arrays.asList("one", "two", "three")); List
list =...read more
Q7. 1.what is Core java , spring boot ,micro services ?
Core Java is a programming language, Spring Boot is a framework for building web applications, and Microservices is an architectural style for building distributed systems.
Core Java is used for developing standalone applications and is the foundation for many other Java frameworks.
Spring Boot is a popular framework for building web applications that simplifies the development process.
Microservices is an architectural style for building distributed systems where each service i...read more
Q8. Difference between Scenario & Scenario Outline in Cucumber?
Scenario is a single test case while Scenario Outline is a template for multiple test cases.
Scenario is a single test case that describes a particular behavior of the system
Scenario Outline is a template for multiple test cases with placeholders for input values
Scenario Outline uses Examples table to provide input values for each test case
Scenario Outline reduces code duplication and makes test cases more maintainable
Q9. What are functional interfaces? What is the need to have functional interfaces?
Functional interfaces are interfaces with only one abstract method. They are used for lambda expressions and method references.
Functional interfaces are used for functional programming in Java.
They are used for lambda expressions and method references.
They have only one abstract method.
Examples of functional interfaces are Runnable, Callable, and Comparator.
Functional interfaces can be annotated with @FunctionalInterface to ensure they have only one abstract method.
Q10. What are the different types of popups and how do u handle them?
Different types of popups and how to handle them
Modal popups - require user action before continuing
Non-modal popups - can be closed without user action
Lightbox popups - overlay on top of the page
Sticky popups - remain visible even when scrolling
To handle popups, use automation tools like Selenium or manually close them
For modal popups, interact with the popup to close or continue
For non-modal popups, click the close button or click outside the popup to close
For lightbox popu...read more
Q11. What are microservices and why it is used for .
Microservices are a software architecture pattern where applications are built as a collection of small, loosely coupled services.
Microservices allow for modular development and deployment of applications.
Each microservice can be developed, deployed, and scaled independently.
Microservices communicate with each other through APIs.
They promote flexibility, scalability, and fault tolerance.
Examples of microservices include Netflix, Amazon, and Uber.
Q12. How will you design framework, what are the things to consider will designing framework,
Q13. why you are not able to increase / decrease the VM resource?
There could be several reasons why I am not able to increase/decrease the VM resource.
Insufficient permissions: I may not have the necessary administrative privileges to modify the VM resource settings.
Resource limitations: The host server may have reached its resource capacity, preventing any further changes.
VMware tools not installed: Without VMware tools installed on the guest OS, resource modifications may not be possible.
Resource pool restrictions: The VM may be part of ...read more
Q14. How to differentiate sale transaction, ecom transaction and refund transaction.
Sale, ecom and refund transactions can be differentiated based on their purpose and flow.
Sale transaction is when a customer purchases a product or service at full price.
Ecom transaction is when a customer purchases a product or service online.
Refund transaction is when a customer returns a product or service and receives a refund.
Sale and ecom transactions involve payment, while refund transactions involve returning the payment.
Sale and ecom transactions are revenue-generati...read more
Q15. Explain design patterns you know
Design patterns are reusable solutions to common software problems.
Creational patterns: Singleton, Factory, Abstract Factory
Structural patterns: Adapter, Decorator, Facade
Behavioral patterns: Observer, Strategy, Command
Architectural patterns: Model-View-Controller, Model-View-ViewModel
Concurrency patterns: Thread Pool, Producer-Consumer
Examples: Singleton ensures only one instance of a class exists, Factory creates objects without exposing the instantiation logic, Observer al...read more
Q16. How do u decide the priority and severity of your test cases?
Priority and severity of test cases are decided based on risk analysis and impact on end-users.
Perform risk analysis to identify critical functionalities
Assign priority based on business impact and frequency of use
Assign severity based on impact on end-users and system functionality
Consider dependencies and interrelationships between test cases
Re-evaluate priority and severity as needed throughout testing process
Q17. what are the remote console for Dell , HP, Lenovo servers?
The remote console for Dell servers is called iDRAC, for HP servers it is called iLO, and for Lenovo servers it is called IMM.
Dell servers use iDRAC (Integrated Dell Remote Access Controller) for remote console access.
HP servers use iLO (Integrated Lights-Out) for remote console access.
Lenovo servers use IMM (Integrated Management Module) for remote console access.
Q18. How do you handle exceptions in Rest APIs
Exceptions in Rest APIs are handled using try-catch blocks and appropriate error responses.
Use try-catch blocks to catch exceptions that may occur during API execution.
Handle different types of exceptions separately to provide specific error responses.
Return appropriate HTTP status codes and error messages in the response.
Log the exception details for debugging purposes.
Consider using a global exception handler to centralize exception handling logic.
Q19. How would you use your script to to do regression testing?
I would use my script to automate the execution of test cases and compare the results with expected outcomes.
Create a test suite with all the test cases to be executed
Automate the execution of the test suite using the script
Compare the actual results with the expected outcomes
Report any discrepancies found during the regression testing
Q20. What is the highest limit of Hashmap?
The highest limit of HashMap is Integer.MAX_VALUE, which is 2^31 - 1.
The highest limit is determined by the maximum capacity of an array in Java, which is Integer.MAX_VALUE.
The default initial capacity of a HashMap is 16, and it automatically increases its capacity as needed.
If the number of elements exceeds the maximum capacity, an OutOfMemoryError will be thrown.
Q21. Automation framework which used in previous org
We used a hybrid automation framework which combined data-driven and keyword-driven approaches.
The framework was built using Selenium WebDriver and TestNG.
It allowed us to write test cases in a modular and reusable manner.
We used Excel sheets to store test data and keywords.
The framework also had reporting capabilities using ExtentReports.
We followed the Page Object Model design pattern for better maintainability.
Q22. What is load balancer? Algorithm explain.
A load balancer is a device or software that distributes incoming network traffic across multiple servers to ensure efficient use of resources and prevent overload.
Load balancers improve the performance and reliability of applications by distributing traffic evenly across servers.
They can be hardware-based or software-based, and can be implemented at different layers of the network stack.
Common load balancing algorithms include round-robin, least connections, and IP hash.
Exam...read more
Q23. What is web garden and uses of web garden?
A web garden is a configuration in which multiple worker processes are used to handle incoming web requests, improving scalability and performance.
Web garden is used to improve the scalability and performance of web applications by utilizing multiple worker processes.
It can help distribute the load of incoming requests across multiple processes, reducing bottlenecks and improving response times.
Web garden can be particularly useful for applications with high traffic or resour...read more
Q24. Ngrx state management, how do you manage state in your current project?
I use Ngrx for state management in my current project by defining actions, reducers, effects, and selectors.
Define actions to describe user events or interactions
Create reducers to specify how state should change in response to actions
Implement effects to manage side effects like API calls
Use selectors to retrieve specific pieces of state for components
Q25. Write code for that design pattern
Factory Method Pattern
Defines an interface for creating objects, but lets subclasses decide which class to instantiate
Encapsulates object creation logic to a separate class
Useful when a class can't anticipate the type of objects it needs to create
Example: java.util.Calendar.getInstance()
Example: javax.xml.parsers.DocumentBuilderFactory.newInstance()
Q26. How do you take a log from Physical Host from remote location?
To take a log from a physical host from a remote location, you can use remote access tools like SSH or remote desktop.
Use SSH to remotely access the physical host and navigate to the log file location
Copy the log file to your local machine using SCP or SFTP
Alternatively, use remote desktop to connect to the physical host and access the log file directly
Ensure you have the necessary credentials and network connectivity to establish remote access
Q27. Given a list of numbers and insisted to get the sum of numbers which gives 6
Iterate through the list and find pairs of numbers that sum up to 6
Iterate through the list and check if the current number + any other number in the list equals 6
Store the pairs of numbers that sum up to 6 in a separate list
Return the list of pairs
Q28. how hashset and hashmap work internally?
HashSet and HashMap are both data structures in Java that use hashing to store and retrieve elements.
HashSet uses HashMap internally to store its elements as keys with a dummy value.
HashMap uses an array of linked lists called buckets to store key-value pairs.
Both HashSet and HashMap use the hashCode() method to calculate the hash value of keys.
HashSet uses the hash value to determine the bucket where an element should be stored.
HashMap uses the hash value to determine the bu...read more
Q29. Explain Scrum, Sprint review, Scrum event, what does mean by retrospective
Q30. What is the base24 internal message format.
Base24 is an internal message format used in financial transactions.
Base24 is a binary-coded decimal (BCD) format.
It is used for financial transactions such as ATM withdrawals and credit card payments.
Each message is made up of a header, a body, and a trailer.
The header contains information about the message, such as the message type and the sender.
The body contains the actual data being transmitted.
The trailer contains information about the message, such as a checksum to ens...read more
Q31. What is MTI? Please explain the in brief.
MTI stands for Machine Translation Interface. It is a software tool used to translate text from one language to another.
MTI is used to translate text from one language to another
It is a software tool that uses machine learning algorithms to improve translation accuracy
MTI is commonly used in the localization industry to translate software and websites
Examples of MTI tools include Google Translate and Microsoft Translator
Q32. Data blending, difference between extract and live data source
Extract data source is a static snapshot while live data source is real-time data. Data blending combines data from multiple sources.
Extract data source is a subset of data from a larger data source that is saved as a static snapshot.
Live data source is real-time data that is directly connected to the source system.
Data blending combines data from multiple sources to create a unified view.
Extract data source is faster for large datasets while live data source provides real-ti...read more
Q33. What is checked unchecked exceptions?
Checked exceptions are exceptions that must be declared in a method's signature or handled using try-catch blocks.
Checked exceptions are checked at compile-time.
They are typically used for exceptional conditions that can be reasonably recovered from.
Examples of checked exceptions in Java include IOException, SQLException, and ClassNotFoundException.
Q34. What are streams in Java and why are they used?
Streams in Java are a sequence of elements that can be processed in parallel or sequentially.
Streams are used to perform operations on collections of data in a concise and functional way.
They can be used to filter, map, reduce, and sort data.
Streams can be processed in parallel to improve performance.
Examples of stream methods include filter(), map(), reduce(), and sorted().
Q35. what is thread pool and how to manage it?
Thread pool is a collection of threads that are used to execute tasks concurrently. It helps in reducing the overhead of thread creation.
Thread pool manages a fixed number of threads and assigns tasks to them as they become available.
It helps in improving the performance of applications by reducing the time taken to create and destroy threads.
Thread pool can be managed using various parameters such as the size of the thread pool, the priority of threads, and the maximum numbe...read more
Q36. Write method to display number of objects created for a given class
Method to display number of objects created for a given class
Create a static variable to keep track of the number of objects created
Increment the variable in the class constructor
Create a static method to return the number of objects created
Call the static method to display the number of objects created
Q37. what design pattern are there in java and on which pattern have you worked.
Java has several design patterns such as Singleton, Factory, Observer, Decorator, etc.
Singleton pattern ensures that only one instance of a class is created
Factory pattern provides an interface for creating objects in a superclass, but allows subclasses to alter the type of objects that will be created
Observer pattern defines a one-to-many dependency between objects so that when one object changes state, all its dependents are notified and updated automatically
Decorator patte...read more
Q38. Why mobile testing is important, how to scroll on phone,Touch Actions class,Selenium4 features,Appium 2.X features, one coding in Java
Mobile testing is important for ensuring the functionality and usability of applications on various devices. Techniques like scrolling and touch actions are essential for testing mobile apps.
Mobile testing ensures that applications work correctly on different devices and screen sizes.
Scrolling on a phone can be done using methods like swipe or scroll actions in automation tools like Appium.
The Touch Actions class in Selenium allows for performing complex touch gestures like t...read more
Q39. What are the java8 features
Java8 features include lambda expressions, functional interfaces, streams, and default methods.
Lambda expressions allow functional programming and simplify code.
Functional interfaces enable the use of lambda expressions.
Streams provide a way to process collections of data in a functional way.
Default methods allow interfaces to have method implementations.
Other features include the Date and Time API, Nashorn JavaScript engine, and improved security.
Q40. Javascript program solving techniques Angular frameworks Real time examples
Javascript program solving techniques and real-time examples using Angular frameworks.
Use modular programming to break down complex problems into smaller, more manageable parts.
Use debugging tools to identify and fix errors in code.
Use event-driven programming to create responsive and interactive user interfaces.
Use data binding to keep the view and model in sync.
Examples: Creating a real-time chat application using Angular's WebSocket API, implementing a real-time stock tick...read more
Q41. How have you used oops concepts in your project?
I have used OOPs concepts extensively in my project.
I have implemented inheritance to reuse code and reduce redundancy.
I have used encapsulation to hide implementation details and protect data.
I have used polymorphism to create flexible and extensible code.
I have used abstraction to simplify complex systems and improve maintainability.
For example, I created a base class for database operations and derived classes for specific databases, which allowed me to reuse code and easi...read more
Q42. Explain data warehouse conceprs and used in your current project?
Data warehouse is a central repository of data used for reporting and analysis.
Data is extracted from various sources and transformed to fit into the warehouse schema.
Data is organized into dimensions and facts for efficient querying.
Used for business intelligence and decision-making.
In my current project, we use a data warehouse to store and analyze customer behavior data.
We extract data from our website, mobile app, and CRM system and transform it to fit into our warehouse ...read more
Q43. Why data class require at least one parameter in primary construction?
Data class requires at least one parameter in primary constructor to ensure each instance of the class is unique.
Primary constructor parameters are used to initialize properties in data class.
Data classes are designed to hold data, so having at least one parameter ensures uniqueness of instances.
Without parameters, instances of data class would be identical and defeat the purpose of data class.
Q44. What do you understand about Private banking and HNWI
Q45. Explain authorization and authentication in transaction.
Authorization and authentication are security measures used in transactions to ensure only authorized users can access and perform actions on the system.
Authentication verifies the identity of the user, usually through a username and password.
Authorization determines what actions the user is allowed to perform based on their role or permissions.
Both are important in ensuring the security and integrity of the system.
Examples include logging into a bank account, accessing a sec...read more
Q46. given 2 table and explain o/p a(1,1,1,2,3) b(1,1,3,4,5) innner join left and right and cross join
Explanation of inner join, left join, right join, and cross join with given tables a and b.
Inner join: Returns only the rows where there is a match in both tables based on the specified condition.
Left join: Returns all rows from the left table and the matched rows from the right table. If there is no match, NULL values are returned.
Right join: Returns all rows from the right table and the matched rows from the left table. If there is no match, NULL values are returned.
Cross j...read more
Q47. provide o/p for innerjoin, left join, right join, cross join on a(1,1,1,2,2,3) b(1,1,2,4)
Different types of SQL joins with given data sets a and b.
Inner join: Returns rows where there is a match in both tables (1,1)
Left join: Returns all rows from the left table and the matched rows from the right table (1,1,1,2,2)
Right join: Returns all rows from the right table and the matched rows from the left table (1,1,2,4)
Cross join: Returns the Cartesian product of the two tables (1,1,1,1,1,2,1,4,1,1,2,1,2,2,1,4,2,1,2,2,2,2,4,3,1,1,3,1,2,3,1,4,3,1,1,3,2,2,3,2,4,3,1,2,3,2,...read more
Q48. Q1.What is trails Q2.What is Scala object. 3. how to create case class 4.Write a program for Fibonacci Sequence. 45 explain import sample Q6. what is trails
A set of questions related to programming concepts and syntax.
Trails may refer to a path followed by a program's execution or a set of tutorials for learning a programming language.
Scala object is a singleton instance of a class that can be used to hold utility methods or constants.
Case classes are immutable classes that are used to hold data.
Fibonacci sequence is a series of numbers where each number is the sum of the two preceding ones.
Import statement is used to bring exte...read more
Q49. Would transaction be rolled back if innermost stored procedure throws an error ?
Yes, the transaction will be rolled back if the innermost stored procedure throws an error.
If an error occurs in the innermost stored procedure, it will cause the entire transaction to be rolled back.
This ensures that the database remains in a consistent state.
Rolling back the transaction means that any changes made by the stored procedures within the transaction will be undone.
Q50. Count the frequency of alphabet in a word using Java?
Count the frequency of alphabet in a word using Java.
Convert the word to lowercase.
Create an array of size 26 to store the frequency of each alphabet.
Iterate through the word and increment the corresponding index in the array.
Print the frequency of each alphabet.
Q51. Hoe to handle batch jobs using Automation?
Batch jobs can be handled using automation by creating scripts or using scheduling tools.
Create scripts to automate the execution of batch jobs
Use scheduling tools to schedule and manage batch jobs
Monitor the status and progress of batch jobs
Handle errors and exceptions during batch job execution
Generate reports and logs for batch job results
Q52. 1. Testng framework details 2. Difference btween string and stringbuilder 3. Current project framework details 4. POM
Questions related to TestNG, String and StringBuilder, current project framework details, and POM.
TestNG is a testing framework for Java
String is immutable while StringBuilder is mutable
Current project framework details depend on the project
POM is a design pattern for creating object repositories
Q53. How many types of lock are there in java and how to achieve multithreading.
There are two types of locks in Java - synchronized and ReentrantLock. Multithreading can be achieved by using these locks.
Two types of locks in Java are synchronized and ReentrantLock
Synchronized keyword can be used to achieve synchronization in Java
ReentrantLock provides more flexibility and control over locking mechanisms
Example: synchronized block - synchronized(obj) { // code }
Example: ReentrantLock - ReentrantLock lock = new ReentrantLock(); lock.lock(); // code; lock.u...read more
Q54. How to check production issue at app level
To check production issues at the app level, one can use logging, monitoring tools, error tracking services, and user feedback.
Utilize logging to track errors and events in the application
Implement monitoring tools to keep track of performance metrics and system health
Use error tracking services like Sentry or Rollbar to receive real-time notifications of issues
Collect user feedback through surveys or support tickets to identify and prioritize issues
Q55. Run time polymorphism vs compile time polymorphism
Run time polymorphism is method overriding while compile time polymorphism is method overloading.
Compile time polymorphism is resolved at compile time while run time polymorphism is resolved at runtime.
Method overloading is an example of compile time polymorphism while method overriding is an example of run time polymorphism.
Compile time polymorphism is faster than run time polymorphism as it is resolved at compile time.
Run time polymorphism is achieved through inheritance an...read more
Q56. how to implement global search filter
Implement global search filter for efficient data retrieval across all fields
Utilize a centralized search function to query all relevant fields in the database
Implement filters for different data types (text, numbers, dates) to refine search results
Include options for advanced search criteria such as boolean operators or wildcards
Optimize search performance by indexing frequently searched fields
Q57. In API testing in postman when do we get 408 status
A 408 status in API testing in Postman is received when the server times out while waiting for a request.
408 status code indicates that the server did not receive a complete request within the time that it was prepared to wait.
This can happen if the client takes too long to send the request or if the server is overloaded.
It is important to adjust timeout settings in Postman to avoid receiving 408 status codes.
Example: If the server expects a request to be completed within 10 ...read more
Q58. What is string and use
A string is a sequence of characters. It is used to store and manipulate text.
Strings are enclosed in quotes, either single or double.
They can be concatenated using the + operator.
String methods include length(), indexOf(), and substring().
Examples: 'Hello, world!', '1234', 'This is a string.'
Q59. Write a query to identify and remove duplicated from a table.
Use a query with GROUP BY and HAVING clause to identify and remove duplicates from a table.
Use GROUP BY to group rows with the same values
Use HAVING COUNT(*) > 1 to identify duplicates
Use DELETE statement to remove duplicates
Q60. Difference between Futures and Forward, OTC derivatives example
Q61. give a table teams with only one columns teamname each team play with each other ones
Create a table with team names where each team plays with each other once.
Create a table teams with column teamname
Insert team names into the table
Use a combination of team names to represent matches
Q62. What is selenium? What is xpath? What do you mean by annotations is java script? What do you know about java with selenium?
Selenium is a tool used for automating web browsers. XPath is a language used for selecting nodes in an XML document.
Selenium is used for testing web applications by automating browser actions
XPath is used to navigate through elements and attributes in an XML document
Annotations in Java are used to provide additional information about code
Java with Selenium is used to write test scripts for web applications
Q63. What does mean by Mark to market?
Q64. Publisher consumer using blocking queue Java 8 filters DSA beginner level
Implementing publisher consumer using blocking queue in Java 8 with beginner level DSA knowledge
BlockingQueue interface in Java provides a thread-safe way to implement producer-consumer pattern
Java 8 filters can be used to filter elements from a collection based on a predicate
Beginner level DSA knowledge can be used to implement basic data structures like queues
Q65. How my knowledge can be useful in future project
My knowledge can be useful in future projects by providing valuable insights, identifying opportunities for improvement, and ensuring successful implementation.
I have a strong understanding of business processes and can identify areas for optimization and efficiency.
I am skilled in data analysis and can provide valuable insights to drive informed decision-making.
I have experience in project management and can ensure successful implementation of initiatives.
I am proficient in ...read more
Q66. What are different ways to Inject services
Different ways to inject services in .NET
Constructor Injection: Services are injected through a class constructor
Property Injection: Services are injected through public properties
Method Injection: Services are injected as method parameters
Service Locator Pattern: Services are accessed through a central registry
DI Containers: Frameworks like Autofac, Unity, or Ninject manage service injection
Q67. Internal working of Hashmap and hashset
Hashmap and hashset are data structures used to store and retrieve data efficiently.
Hashmap uses key-value pairs to store data and allows null values for both keys and values.
Hashset stores unique values and does not allow duplicates.
Both use hashing to locate and retrieve data quickly.
Hashmap is implemented using a hash table while hashset is implemented using a hash map.
Q68. what are Index and types of index
Indexes are data structures that improve the speed of data retrieval operations in a database.
Indexes are used to quickly locate data without having to search every row in a database table.
Types of indexes include clustered, non-clustered, unique, and composite indexes.
Clustered indexes determine the physical order of data in a table, while non-clustered indexes store a separate copy of the indexed columns.
Unique indexes ensure that no two rows have the same values in the ind...read more
Q69. Present CTC per annum
Current CTC is INR 12,00,000 per annum
Current CTC is INR 12,00,000 per annum
CTC includes salary, bonuses, and other benefits
CTC may vary based on performance and company policies
Q70. Expected CTC per annum
Expected CTC per annum is negotiable based on the role and responsibilities.
CTC can vary based on the company, industry, location, and level of experience.
It is important to research the market standards for the specific role before providing a figure.
Candidates can mention a range or state that they are open to discussing compensation during the interview process.
Q71. what is different desired Capabalities in appium?
Desired capabilities in Appium are specific settings that are used to customize the behavior of the automation session.
Desired capabilities are used to set up the automation environment before the test starts
They can include settings such as device name, platform name, platform version, app package, app activity, etc.
Desired capabilities are passed as a dictionary or JSON object to the Appium server when initializing a new session
Q72. explain row_number, rank, dense_rank with exmaple ..
row_number assigns a unique sequential integer to each row, rank assigns a unique rank to each row with gaps, dense_rank assigns a unique rank to each row without gaps.
row_number assigns a unique sequential integer to each row in the result set
rank assigns a unique rank to each row in the result set with gaps between ranks
dense_rank assigns a unique rank to each row in the result set without any gaps
Q73. departmnet wise highest salary, and then 5 highest salary
To find department wise highest salary and then 5 highest salaries, use SQL queries with GROUP BY and ORDER BY clauses.
Use SQL query with GROUP BY clause to get department wise highest salary
Use ORDER BY clause to get 5 highest salaries overall
Q74. difference between groupby and having clause
GROUP BY is used to group rows that have the same values into summary rows, while HAVING is used to filter groups based on a specified condition.
GROUP BY is used with aggregate functions to group the result set by one or more columns.
HAVING is used to filter groups based on a specified condition after the GROUP BY clause.
GROUP BY is used before the HAVING clause in a query.
Example: SELECT department, COUNT(*) FROM employees GROUP BY department HAVING COUNT(*) > 5;
Q75. difference between Primary key and Unique key
Primary key uniquely identifies each record in a table, while Unique key allows only one instance of a value in a column.
Primary key does not allow NULL values, while Unique key allows one NULL value.
Primary key automatically creates a clustered index, while Unique key creates a non-clustered index by default.
Primary key can be referenced by foreign keys, while Unique key cannot be referenced by foreign keys.
Q76. diffrenc between function and store procedure
Functions return a value, while stored procedures do not. Functions can be used in SELECT statements, stored procedures cannot.
Functions return a single value, while stored procedures can return multiple values or none at all.
Functions can be used in SELECT statements to return a value, while stored procedures cannot be used in this way.
Functions can be called from within stored procedures, but stored procedures cannot be called from within functions.
Q77. Difference between Arraylist vs linked list interface vs abstract locators
Arraylist vs linked list, interface vs abstract, locators
ArrayList and LinkedList are both used to store collections of data, but ArrayList is faster for accessing elements while LinkedList is faster for adding or removing elements.
Interfaces are used to define a contract for a class to implement, while abstract classes can provide some implementation and cannot be instantiated.
Locators are used in test automation to identify web elements on a page, such as ID, name, class, o...read more
Q78. What is sql, how to write a query
SQL is a programming language used to manage and manipulate relational databases.
SQL stands for Structured Query Language
Queries are written to retrieve, insert, update or delete data from a database
Basic syntax: SELECT column1, column2 FROM table_name WHERE condition
Example: SELECT * FROM customers WHERE city='New York'
Other commands include INSERT, UPDATE, DELETE, CREATE, DROP, etc.
Q79. Find occurance of each element of an array using Streams API
Using Streams API to find occurrence of each element in an array of strings
Use Arrays.stream() to convert the array to a stream
Use Collectors.groupingBy() to group elements by their occurrences
Use Collectors.counting() to count the occurrences of each element
Q80. Explain Batchcom utility and its use.
Batchcom is a utility used for batch communication between two systems.
Batchcom is used to transfer data between two systems in a batch mode.
It is commonly used in mainframe environments.
Batchcom can be used to transfer large amounts of data efficiently.
It can also be used to automate batch processes.
Batchcom supports various file formats such as fixed-length, variable-length, and delimited files.
Q81. How to sort array without using built in method
Use a sorting algorithm like bubble sort or quicksort to sort the array without using built-in methods.
Implement bubble sort algorithm to compare and swap elements in the array.
Alternatively, implement quicksort algorithm to recursively divide and conquer the array.
Ensure to handle edge cases like empty array or array with only one element.
Q82. Dependency injection and its types
Dependency injection is a design pattern that allows objects to be passed as dependencies rather than being created within a class.
Types of dependency injection include constructor injection, setter injection, and interface injection.
Constructor injection involves passing dependencies through a class's constructor.
Setter injection involves passing dependencies through a class's setter methods.
Interface injection involves implementing an interface that defines the necessary de...read more
Q83. Background keyword in Cucumber? Use of it?
Background keyword is used to define steps that are common to all scenarios in a feature file.
Background keyword is used to reduce code duplication in feature files.
It is defined at the beginning of a feature file, before any scenarios.
Steps defined in the background section are executed before each scenario in the feature file.
It is useful for setting up preconditions or initializing data that is required for all scenarios.
Example: Given a user is logged in, When they naviga...read more
Q84. Internal working of data Structures
Data structures are used to organize and store data in a way that enables efficient access and modification.
Data structures can be classified as linear or non-linear
Examples of linear data structures include arrays, linked lists, and stacks
Examples of non-linear data structures include trees and graphs
Data structures can be implemented using various programming languages
Efficient algorithms for searching, sorting, and manipulating data depend on the choice of data structure
Q85. Selenium using web drivers and show Xpath
Q86. Write a java program for a string to get the character count
Java program to count characters in a string
Use a HashMap to store character counts
Iterate through the string and update the counts in the map
Handle both uppercase and lowercase characters separately
Q87. What is cicd pipeline and describe cicd in detail.
CI/CD pipeline is a set of automated processes that allow developers to deliver code changes more frequently and reliably.
CI/CD stands for Continuous Integration/Continuous Delivery.
CI involves automatically building and testing code changes frequently to catch errors early.
CD involves automatically deploying code changes to production after passing tests.
CI/CD pipelines typically include stages like build, test, deploy, and monitor.
Popular CI/CD tools include Jenkins, GitLab...read more
Q88. How JWT authentications work in Web API
JWT authentication in Web API involves generating a token with user credentials and validating it on subsequent requests.
JWT stands for JSON Web Token, which is a compact and self-contained way for securely transmitting information between parties as a JSON object.
In Web API, a JWT token is generated upon successful authentication and is sent to the client.
The client includes the JWT token in the Authorization header of subsequent requests to access protected resources.
The We...read more
Q89. write-behind vs write-through cache scheme
Write-behind and write-through are caching schemes used to improve performance and data consistency.
Write-behind cache scheme delays the write operation to the main storage until it is necessary, improving write performance.
Write-through cache scheme writes data to both the cache and the main storage simultaneously, ensuring data consistency.
Write-behind is suitable for scenarios where write performance is critical, but data consistency can be compromised temporarily.
Write-th...read more
Q90. what is MVVM and how to bind data using MVVM
MVVM is a design pattern that separates the UI from the business logic by introducing a middle layer called ViewModel.
Model-View-ViewModel design pattern
ViewModel acts as a link between the Model and View
Data binding is used to connect the ViewModel to the View
Updates in the ViewModel automatically reflect in the View
Q91. what are indexs and types of indexs
Indexes are data structures that improve the speed of data retrieval operations in a database. There are different types of indexes.
Indexes are used to quickly locate data without having to search every row in a database table.
Types of indexes include clustered indexes, non-clustered indexes, unique indexes, and composite indexes.
Clustered indexes physically reorder the data in the table based on the index key.
Non-clustered indexes store a separate copy of the indexed columns...read more
Q92. Explain OOP Concepts in terms of Python
OOP in Python involves creating classes and objects, encapsulation, inheritance, and polymorphism.
Classes are used to define objects and their properties
Encapsulation ensures that data is hidden and can only be accessed through methods
Inheritance allows for the creation of subclasses that inherit properties and methods from a parent class
Polymorphism allows for the use of a single method or function to handle different types of objects
Python supports multiple inheritance and ...read more
Q93. How to create a SSL certificate?
Q94. What is the webform?
A webform is an online form used to collect information from users on a website.
Webforms typically include fields for users to input their name, email, and other relevant information.
Webforms can be used for various purposes such as contact forms, registration forms, surveys, and more.
Webforms can be created using HTML, CSS, and JavaScript, or through online form builders like Google Forms or Typeform.
Q95. Explain DMS and SMS concept.
DMS and SMS are concepts related to testing. DMS stands for Defect Management System and SMS stands for Test Management System.
DMS is used to track and manage defects found during testing.
SMS is used to manage the entire testing process, including test planning, execution, and reporting.
DMS and SMS are often integrated to provide a comprehensive testing solution.
Examples of DMS include JIRA, Bugzilla, and HP Quality Center.
Examples of SMS include HP ALM, IBM Rational Quality ...read more
Q96. Tell abt ur leasure time (trick)
During my leisure time, I enjoy reading books, going for hikes, and trying out new recipes.
Reading books helps me relax and expand my knowledge.
Hiking allows me to connect with nature and stay active.
Trying out new recipes is a creative outlet for me and I enjoy experimenting with different flavors.
Q97. Coding questions. Add digits of an integer using streams.
Add digits of an integer using streams.
Convert the integer to a string
Split the string into individual characters
Convert each character back to an integer
Sum all the integers using streams
Q98. What is ITIL change management.
ITIL change management is a framework that helps organizations manage and control changes to their IT infrastructure.
ITIL change management is a part of the IT Infrastructure Library (ITIL) framework.
It involves the process of requesting, evaluating, approving, and implementing changes to IT systems.
The goal is to minimize the impact of changes on IT services and ensure they are aligned with business objectives.
Change management includes documenting change requests, assessing...read more
Q99. SQL query to get Second highest salary of employee
Use SQL query with subquery to get second highest salary of employee.
Use ORDER BY clause to sort salaries in descending order
Use LIMIT 1,1 to get the second row after skipping the first row
Use a subquery to select the second highest salary
Q100. Singleton using double check locking
Double check locking is a design pattern used to prevent multiple threads from creating multiple instances of a singleton class.
Create a private static instance variable with volatile keyword to ensure visibility across threads
Use synchronized block inside if condition to check and create instance only once
Check instance again inside synchronized block to prevent race condition
Example: private static volatile Singleton instance; public static Singleton getInstance() { if (ins...read more
More about working at Synechron
Top HR Questions asked in null
Interview Process at null
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month