Add office photos
Engaged Employer

Synechron

3.5
based on 2.9k Reviews
Video summary
Filter interviews by

200+ Bazoki Interview Questions and Answers

Updated 23 Feb 2025
Popular Designations

Q101. Internal working of Hashmap and hashset

Ans.

Hashmap and hashset are data structures used to store and retrieve data efficiently.

  • Hashmap uses key-value pairs to store data and allows null values for both keys and values.

  • Hashset stores unique values and does not allow duplicates.

  • Both use hashing to locate and retrieve data quickly.

  • Hashmap is implemented using a hash table while hashset is implemented using a hash map.

Add your answer

Q102. Find occurance of each element of an array using Streams API

Ans.

Using Streams API to find occurrence of each element in an array of strings

  • Use Arrays.stream() to convert the array to a stream

  • Use Collectors.groupingBy() to group elements by their occurrences

  • Use Collectors.counting() to count the occurrences of each element

Add your answer

Q103. Explain Batchcom utility and its use.

Ans.

Batchcom is a utility used for batch communication between two systems.

  • Batchcom is used to transfer data between two systems in a batch mode.

  • It is commonly used in mainframe environments.

  • Batchcom can be used to transfer large amounts of data efficiently.

  • It can also be used to automate batch processes.

  • Batchcom supports various file formats such as fixed-length, variable-length, and delimited files.

Add your answer

Q104. what are Index and types of index

Ans.

Indexes are data structures that improve the speed of data retrieval operations in a database.

  • Indexes are used to quickly locate data without having to search every row in a database table.

  • Types of indexes include clustered, non-clustered, unique, and composite indexes.

  • Clustered indexes determine the physical order of data in a table, while non-clustered indexes store a separate copy of the indexed columns.

  • Unique indexes ensure that no two rows have the same values in the ind...read more

Add your answer
Discover Bazoki interview dos and don'ts from real experiences

Q105. How to sort array without using built in method

Ans.

Use a sorting algorithm like bubble sort or quicksort to sort the array without using built-in methods.

  • Implement bubble sort algorithm to compare and swap elements in the array.

  • Alternatively, implement quicksort algorithm to recursively divide and conquer the array.

  • Ensure to handle edge cases like empty array or array with only one element.

Add your answer

Q106. Write code to Automate sauce demo login functionality

Ans.

Automate sauce demo login functionality using code

  • Use Selenium WebDriver to automate the login process

  • Identify the username and password fields using locators

  • Enter valid credentials and click on the login button

  • Verify successful login by checking for the presence of a welcome message

Add your answer
Are these interview questions helpful?

Q107. Write code to automate getting product prices by their names

Ans.

Automate getting product prices by their names

  • Create a function that takes in an array of product names as input

  • Use a web scraping tool like Selenium to extract prices from a website

  • Map the product names to their corresponding prices and return the result

Add your answer

Q108. What is the Node.js Event Loop?

Ans.

Node.js Event Loop is a mechanism that allows Node.js to perform non-blocking I/O operations.

  • The Event Loop is responsible for handling asynchronous operations in Node.js.

  • It allows Node.js to perform I/O operations without blocking the execution of other code.

  • Event Loop continuously checks the event queue for new events and executes them in a loop.

  • Node.js uses libuv library to implement the Event Loop.

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q109. Background keyword in Cucumber? Use of it?

Ans.

Background keyword is used to define steps that are common to all scenarios in a feature file.

  • Background keyword is used to reduce code duplication in feature files.

  • It is defined at the beginning of a feature file, before any scenarios.

  • Steps defined in the background section are executed before each scenario in the feature file.

  • It is useful for setting up preconditions or initializing data that is required for all scenarios.

  • Example: Given a user is logged in, When they naviga...read more

Add your answer

Q110. Internal working of data Structures

Ans.

Data structures are used to organize and store data in a way that enables efficient access and modification.

  • Data structures can be classified as linear or non-linear

  • Examples of linear data structures include arrays, linked lists, and stacks

  • Examples of non-linear data structures include trees and graphs

  • Data structures can be implemented using various programming languages

  • Efficient algorithms for searching, sorting, and manipulating data depend on the choice of data structure

Add your answer

Q111. Selenium using web drivers and show Xpath

Add your answer

Q112. Write a java program for a string to get the character count

Ans.

Java program to count characters in a string

  • Use a HashMap to store character counts

  • Iterate through the string and update the counts in the map

  • Handle both uppercase and lowercase characters separately

Add your answer

Q113. What is cicd pipeline and describe cicd in detail.

Ans.

CI/CD pipeline is a set of automated processes that allow developers to deliver code changes more frequently and reliably.

  • CI/CD stands for Continuous Integration/Continuous Delivery.

  • CI involves automatically building and testing code changes frequently to catch errors early.

  • CD involves automatically deploying code changes to production after passing tests.

  • CI/CD pipelines typically include stages like build, test, deploy, and monitor.

  • Popular CI/CD tools include Jenkins, GitLab...read more

Add your answer

Q114. write-behind vs write-through cache scheme

Ans.

Write-behind and write-through are caching schemes used to improve performance and data consistency.

  • Write-behind cache scheme delays the write operation to the main storage until it is necessary, improving write performance.

  • Write-through cache scheme writes data to both the cache and the main storage simultaneously, ensuring data consistency.

  • Write-behind is suitable for scenarios where write performance is critical, but data consistency can be compromised temporarily.

  • Write-th...read more

Add your answer

Q115. Explain OOP Concepts in terms of Python

Ans.

OOP in Python involves creating classes and objects, encapsulation, inheritance, and polymorphism.

  • Classes are used to define objects and their properties

  • Encapsulation ensures that data is hidden and can only be accessed through methods

  • Inheritance allows for the creation of subclasses that inherit properties and methods from a parent class

  • Polymorphism allows for the use of a single method or function to handle different types of objects

  • Python supports multiple inheritance and ...read more

Add your answer

Q116. what is MVVM and how to bind data using MVVM

Ans.

MVVM is a design pattern that separates the UI from the business logic by introducing a middle layer called ViewModel.

  • Model-View-ViewModel design pattern

  • ViewModel acts as a link between the Model and View

  • Data binding is used to connect the ViewModel to the View

  • Updates in the ViewModel automatically reflect in the View

Add your answer

Q117. How to create a SSL certificate?

Add your answer

Q118. How JWT authentications work in Web API

Ans.

JWT authentication in Web API involves generating a token with user credentials and validating it on subsequent requests.

  • JWT stands for JSON Web Token, which is a compact and self-contained way for securely transmitting information between parties as a JSON object.

  • In Web API, a JWT token is generated upon successful authentication and is sent to the client.

  • The client includes the JWT token in the Authorization header of subsequent requests to access protected resources.

  • The We...read more

Add your answer

Q119. what are indexs and types of indexs

Ans.

Indexes are data structures that improve the speed of data retrieval operations in a database. There are different types of indexes.

  • Indexes are used to quickly locate data without having to search every row in a database table.

  • Types of indexes include clustered indexes, non-clustered indexes, unique indexes, and composite indexes.

  • Clustered indexes physically reorder the data in the table based on the index key.

  • Non-clustered indexes store a separate copy of the indexed columns...read more

Add your answer

Q120. What is the webform?

Ans.

A webform is an online form used to collect information from users on a website.

  • Webforms typically include fields for users to input their name, email, and other relevant information.

  • Webforms can be used for various purposes such as contact forms, registration forms, surveys, and more.

  • Webforms can be created using HTML, CSS, and JavaScript, or through online form builders like Google Forms or Typeform.

Add your answer

Q121. Programming question to find files with duplicate content.

Ans.

Use hashing to find files with duplicate content efficiently.

  • Create a hash function to generate a unique identifier for each file's content.

  • Store the hash values in a dictionary with the corresponding file paths.

  • Identify files with duplicate content by checking for duplicate hash values.

  • Return a list of file paths with duplicate content.

Add your answer

Q122. Explain DMS and SMS concept.

Ans.

DMS and SMS are concepts related to testing. DMS stands for Defect Management System and SMS stands for Test Management System.

  • DMS is used to track and manage defects found during testing.

  • SMS is used to manage the entire testing process, including test planning, execution, and reporting.

  • DMS and SMS are often integrated to provide a comprehensive testing solution.

  • Examples of DMS include JIRA, Bugzilla, and HP Quality Center.

  • Examples of SMS include HP ALM, IBM Rational Quality ...read more

Add your answer

Q123. Tell abt ur leasure time (trick)

Ans.

During my leisure time, I enjoy reading books, going for hikes, and trying out new recipes.

  • Reading books helps me relax and expand my knowledge.

  • Hiking allows me to connect with nature and stay active.

  • Trying out new recipes is a creative outlet for me and I enjoy experimenting with different flavors.

Add your answer

Q124. What is ITIL change management.

Ans.

ITIL change management is a framework that helps organizations manage and control changes to their IT infrastructure.

  • ITIL change management is a part of the IT Infrastructure Library (ITIL) framework.

  • It involves the process of requesting, evaluating, approving, and implementing changes to IT systems.

  • The goal is to minimize the impact of changes on IT services and ensure they are aligned with business objectives.

  • Change management includes documenting change requests, assessing...read more

View 1 answer

Q125. SQL query to get Second highest salary of employee

Ans.

Use SQL query with subquery to get second highest salary of employee.

  • Use ORDER BY clause to sort salaries in descending order

  • Use LIMIT 1,1 to get the second row after skipping the first row

  • Use a subquery to select the second highest salary

Add your answer

Q126. Coding questions. Add digits of an integer using streams.

Ans.

Add digits of an integer using streams.

  • Convert the integer to a string

  • Split the string into individual characters

  • Convert each character back to an integer

  • Sum all the integers using streams

Add your answer

Q127. difference between groupby and having clause

Ans.

GROUP BY is used to group rows that have the same values into summary rows, while HAVING is used to filter groups based on a specified condition.

  • GROUP BY is used with aggregate functions to group the result set by one or more columns.

  • HAVING is used to filter groups based on a specified condition after the GROUP BY clause.

  • GROUP BY is used before the HAVING clause in a query.

  • Example: SELECT department, COUNT(*) FROM employees GROUP BY department HAVING COUNT(*) > 5;

Add your answer

Q128. difference between Primary key and Unique key

Ans.

Primary key uniquely identifies each record in a table, while Unique key allows only one instance of a value in a column.

  • Primary key does not allow NULL values, while Unique key allows one NULL value.

  • Primary key automatically creates a clustered index, while Unique key creates a non-clustered index by default.

  • Primary key can be referenced by foreign keys, while Unique key cannot be referenced by foreign keys.

Add your answer

Q129. diffrenc between function and store procedure

Ans.

Functions return a value, while stored procedures do not. Functions can be used in SELECT statements, stored procedures cannot.

  • Functions return a single value, while stored procedures can return multiple values or none at all.

  • Functions can be used in SELECT statements to return a value, while stored procedures cannot be used in this way.

  • Functions can be called from within stored procedures, but stored procedures cannot be called from within functions.

Add your answer

Q130. Singleton using double check locking

Ans.

Double check locking is a design pattern used to prevent multiple threads from creating multiple instances of a singleton class.

  • Create a private static instance variable with volatile keyword to ensure visibility across threads

  • Use synchronized block inside if condition to check and create instance only once

  • Check instance again inside synchronized block to prevent race condition

  • Example: private static volatile Singleton instance; public static Singleton getInstance() { if (ins...read more

Add your answer

Q131. Procedure and function difference

Ans.

Procedures are reusable blocks of code that can return values, while functions are named blocks of code that can be called.

  • Procedures do not return values, while functions do.

  • Functions must return a value, procedures do not have to.

  • Functions are called by name, procedures are called by using the CALL statement.

  • Functions can be used in SQL queries, procedures cannot.

Add your answer

Q132. How view model works under the hood?

Ans.

View model in Android is a class that stores and manages UI-related data in a lifecycle-conscious way.

  • View model survives configuration changes and is not destroyed when the UI is destroyed.

  • It is used to separate the UI controller logic from the UI layout.

  • View model is typically used with LiveData to update the UI when the data changes.

  • It helps in organizing and handling data for the UI efficiently.

Add your answer

Q133. Control-M enterprise manager components role?

Ans.

Control-M Enterprise Manager components play a crucial role in managing and monitoring batch processing workflows.

  • Control-M Server: Manages scheduling and monitoring of jobs

  • Control-M Agent: Executes jobs on remote servers

  • Control-M/EM GUI: Provides a user interface for managing workflows

  • Control-M/EM Server: Manages communication between components

  • Control-M/EM Reporting Facility: Generates reports on job status and performance

Add your answer

Q134. Dependency injection and its types

Ans.

Dependency injection is a design pattern that allows objects to be passed as dependencies rather than being created within a class.

  • Types of dependency injection include constructor injection, setter injection, and interface injection.

  • Constructor injection involves passing dependencies through a class's constructor.

  • Setter injection involves passing dependencies through a class's setter methods.

  • Interface injection involves implementing an interface that defines the necessary de...read more

Add your answer

Q135. What do you know about synechron

Ans.

Synechron is a global consulting and technology organization providing innovative solutions to financial services industry.

  • Synechron offers services in areas such as digital, business consulting, technology, data science, and blockchain.

  • It has a presence in over 18 countries and serves clients in the banking, insurance, capital markets, and digital sectors.

  • Synechron has won several awards for its innovative solutions and services, including the Best Use of Emerging or Innovat...read more

Add your answer

Q136. How to handle waits, frames & windows

Ans.

Handling waits, frames & windows is crucial for efficient testing in QC Lead role.

  • Use explicit waits to handle synchronization issues

  • Identify and handle frames by switching to them using frame id or name

  • Handle pop-up windows by using window handles and switching between them

  • Use implicit waits to set a default waiting time for elements to be available

Add your answer

Q137. What is event-driven architecture?

Ans.

Event-driven architecture is a design pattern where components communicate through events.

  • Components communicate through events

  • Decoupled architecture

  • Scalable and flexible design

  • Examples: message queues, pub/sub systems

Add your answer

Q138. What is Automation testing

Ans.

Automation testing is the use of software tools to execute tests and compare actual results with expected results.

  • Automation testing saves time and effort compared to manual testing.

  • It can be used for regression testing, load testing, and performance testing.

  • Examples of automation testing tools include Selenium, Appium, and JMeter.

Add your answer

Q139. replicated vs distributed cache

Ans.

Replicated cache stores copies of data on multiple nodes, while distributed cache partitions data across multiple nodes.

  • Replicated cache provides high availability and fault tolerance as data is duplicated on multiple nodes.

  • Distributed cache improves scalability and performance by distributing data across multiple nodes.

  • In replicated cache, all nodes have a complete copy of the data, which can lead to higher memory requirements.

  • In distributed cache, data is divided into parti...read more

Add your answer

Q140. Architecture design of my current project

Ans.

The architecture design of my current project involves a microservices-based approach with containerization using Docker and orchestration with Kubernetes.

  • Utilizing microservices to break down the application into smaller, independent services

  • Implementing containerization with Docker to package and deploy the services

  • Leveraging Kubernetes for orchestration to manage and scale the containers efficiently

Add your answer

Q141. What is concurrent hashmap ?

Ans.

ConcurrentHashMap is a thread-safe implementation of the Map interface in Java.

  • It allows multiple threads to read and write to the map concurrently without any external synchronization.

  • It achieves this by dividing the map into segments and locking only the segment being accessed by a thread.

  • It provides better performance than synchronized HashMap in multi-threaded environments.

  • Example: ConcurrentHashMap map = new ConcurrentHashMap<>();

  • map.put("key", 10); int value = map.get("...read more

Add your answer

Q142. what is thread life cycle?

Ans.

Thread life cycle refers to the various stages a thread goes through during its execution.

  • Thread is created

  • Thread is started

  • Thread is running

  • Thread is blocked

  • Thread is terminated

Add your answer

Q143. What is ineritance

Ans.

Inheritance is a concept in object-oriented programming where a class can inherit attributes and methods from another class.

  • Inheritance allows for code reusability and promotes the concept of hierarchy in programming.

  • The class that is being inherited from is called the parent class or superclass, while the class that inherits is called the child class or subclass.

  • Child classes can override inherited methods or add new methods and attributes.

  • For example, a 'Vehicle' class can ...read more

Add your answer

Q144. what is encapulation

Ans.

Encapsulation is the concept of bundling data and methods that operate on the data into a single unit, known as a class.

  • Encapsulation helps in hiding the internal state of an object and only exposing the necessary functionalities.

  • It allows for better control over the data by preventing direct access from outside the class.

  • Encapsulation promotes code reusability and modularity.

  • Example: In a class representing a bank account, the account balance should be encapsulated within th...read more

Add your answer

Q145. What is dif bet cmd and entry point

Ans.

CMD is used to provide default arguments for an executing container, while ENTRYPOINT is used to specify the command that will run when the container starts.

  • CMD is optional and can be overridden during container runtime

  • ENTRYPOINT is required and cannot be overridden during container runtime

  • CMD can be used to provide default arguments to the ENTRYPOINT command

Add your answer

Q146. Explain your typical Software Testing Life Cycle.

Ans.

Software Testing Life Cycle involves planning, designing, executing, and reporting on tests to ensure quality software.

  • 1. Planning phase involves defining test objectives, scope, and resources.

  • 2. Design phase includes creating test cases, test data, and test environment setup.

  • 3. Execution phase is where tests are run, defects are logged, and retesting is done.

  • 4. Reporting phase involves documenting test results, defects, and overall quality assessment.

  • 5. Iterative process wit...read more

Add your answer

Q147. What are the prerequisites of Appium

Ans.

Prerequisites of Appium include installing Node.js, Java Development Kit (JDK), Android SDK, and Appium server.

  • Install Node.js

  • Install Java Development Kit (JDK)

  • Install Android SDK

  • Install Appium server

Add your answer

Q148. row_number, rank, dense_rank with example

Ans.

row_number, rank, dense_rank are window functions in SQL used to assign a unique number to each row based on specified criteria.

  • row_number() assigns a unique sequential integer starting from 1 to each row in the result set

  • rank() assigns a unique rank to each row based on the specified ordering criteria, with gaps in ranking for ties

  • dense_rank() assigns a unique rank to each row based on the specified ordering criteria, with no gaps in ranking for ties

Add your answer

Q149. What is oberloading and over riding

Ans.

Overloading is when a class has multiple methods with the same name but different parameters. Overriding is when a subclass provides its own implementation of a method from its superclass.

  • Overloading is used to provide different ways to call a method with different parameters

  • Overriding is used to change the behavior of a method in a subclass

  • Overloading is resolved at compile-time while overriding is resolved at runtime

  • Overloading is also known as compile-time polymorphism whi...read more

Add your answer

Q150. Difference between Smoke and sanity?

Ans.

Smoke testing is a preliminary test to check if the software is stable enough for further testing. Sanity testing is a subset of regression testing to check if the bugs have been fixed and new features have been added without breaking the existing functionality.

  • Smoke testing is done to check if the software is stable enough for further testing

  • Sanity testing is done to check if the bugs have been fixed and new features have been added without breaking the existing functionalit...read more

Add your answer

Q151. Internal working of HashMap

Ans.

HashMap is a data structure that stores key-value pairs and provides constant time complexity for basic operations.

  • HashMap uses hashing to store and retrieve elements

  • It allows null values and only one null key

  • Collisions are resolved using separate chaining or open addressing

  • The initial capacity and load factor can be specified during initialization

  • The size of the HashMap is dynamically increased as elements are added

Add your answer

Q152. Concurrent HashMap versus HashMap?

Ans.

Concurrent HashMap is thread-safe and allows concurrent access, while HashMap is not thread-safe.

  • Concurrent HashMap is suitable for multi-threaded environments where multiple threads can access and modify the map concurrently.

  • HashMap is not thread-safe and can lead to data corruption if accessed concurrently by multiple threads.

  • Concurrent HashMap uses internal locking mechanisms to ensure thread safety, while HashMap does not provide such mechanisms.

  • Example: In a web applicat...read more

Add your answer

Q153. What is weakhashmap ?

Ans.

WeakHashMap is a class in Java that provides a hash table implementation with weak keys.

  • It is similar to HashMap but allows garbage collection of keys that are no longer referenced.

  • It is useful in scenarios where you want to associate additional data with an object without affecting its lifecycle.

  • Example: Caching data associated with an object, where the object can be garbage collected when not in use.

Add your answer

Q154. flatten a array without using inbuild functions

Ans.

Flatten an array without using inbuilt functions

  • Create a recursive function to iterate through the array elements

  • Check if each element is an array, if so, call the function recursively

  • Concatenate the elements into a new array

Add your answer

Q155. Machine learning algorithms

Ans.

Machine learning algorithms are used to train models on data to make predictions or decisions.

  • Supervised learning algorithms include linear regression, decision trees, and neural networks.

  • Unsupervised learning algorithms include clustering and dimensionality reduction.

  • Reinforcement learning algorithms involve learning through trial and error.

  • Examples of machine learning applications include image recognition, natural language processing, and fraud detection.

Add your answer

Q156. Write code for producer , consumer in java.

Ans.

Producer-consumer problem is a classic synchronization problem in multithreading.

  • Use wait() and notify() methods for synchronization

  • Create a shared buffer to store data between producer and consumer

  • Ensure proper handling of synchronization to avoid race conditions

Add your answer

Q157. Explain type of Enscribe database.

Ans.

Enscribe database is a hierarchical database used for storing large amounts of data.

  • Enscribe database is a type of hierarchical database.

  • It is used for storing large amounts of data.

  • It is commonly used in mainframe environments.

  • Enscribe databases are organized into records and fields.

  • It supports indexing and querying of data.

  • Examples of Enscribe databases include VSAM and IMS DB.

Add your answer

Q158. write a sql query depart wise max salary

Ans.

SQL query to retrieve the maximum salary for each department

  • Use the MAX() function to find the maximum salary

  • Group the results by department using the GROUP BY clause

  • Join the employee table with the department table to get the department information

Add your answer

Q159. What is closure

Ans.

Closure is the process of finalizing or completing something, often used in project management or therapy.

  • Closure is important for bringing a sense of completion or resolution to a situation.

  • In project management, closure involves wrapping up all loose ends and documenting the project's outcomes.

  • In therapy, closure can refer to the process of accepting and moving on from past experiences or relationships.

  • Closure can also involve communication or conversation to bring about un...read more

Add your answer

Q160. What are core java concepts

Ans.

Core Java concepts are fundamental concepts of Java programming language.

  • Object-oriented programming

  • Inheritance and Polymorphism

  • Exception Handling

  • Multithreading

  • Collections Framework

  • Generics

  • Lambda Expressions

  • Java Virtual Machine (JVM)

  • Garbage Collection

  • Java API

Add your answer

Q161. Delete and truncate difference

Ans.

Delete and truncate are both operations used to remove data, but they differ in their approach and outcome.

  • Delete removes entire records or rows from a database, while truncate removes all records from a table

  • Delete is slower and can be rolled back, while truncate is faster but cannot be rolled back

  • Delete triggers triggers and constraints, while truncate does not

Add your answer

Q162. Explain the jenkinsfile

Ans.

Jenkinsfile is a text file that contains the definition of a Jenkins Pipeline.

  • Jenkinsfile is written in Groovy syntax.

  • It defines the steps, stages, and configuration of a Jenkins Pipeline.

  • It allows for version control and easy sharing of pipeline configurations.

  • Jenkinsfile can be stored in a project's repository alongside the code it builds.

Add your answer

Q163. What is Agile framework?

Ans.

Agile framework is a project management approach that emphasizes flexibility, collaboration, and customer satisfaction.

  • Agile is iterative and incremental, with frequent feedback loops

  • It values individuals and interactions over processes and tools

  • It prioritizes working software over comprehensive documentation

  • It embraces change and welcomes customer involvement throughout the project

  • Examples of Agile frameworks include Scrum, Kanban, and Extreme Programming (XP)

Add your answer

Q164. what is array in the string?

Ans.

An array in a string is a collection of strings stored in a single variable.

  • An array in a string can be created by enclosing multiple strings within square brackets, separated by commas.

  • Example: ['apple', 'banana', 'orange']

  • Each string in the array can be accessed using its index position.

Add your answer

Q165. Multi threading Implementation

Ans.

Multi threading is a technique to execute multiple threads concurrently in a single process.

  • Multi threading improves application performance by utilizing multiple CPU cores.

  • It requires careful synchronization to avoid race conditions and deadlocks.

  • Java provides built-in support for multi threading through the Thread class and Runnable interface.

  • Thread pools can be used to manage and reuse threads efficiently.

  • Multi threading can be used in various applications such as web serv...read more

Add your answer

Q166. what are Types of joins

Ans.

Types of joins in SQL are Inner Join, Left Join, Right Join, and Full Join.

  • Inner Join: Returns rows when there is a match in both tables.

  • Left Join: Returns all rows from the left table and the matched rows from the right table.

  • Right Join: Returns all rows from the right table and the matched rows from the left table.

  • Full Join: Returns rows when there is a match in one of the tables.

Add your answer

Q167. what are DML commands

Ans.

DML commands are Data Manipulation Language commands used to manage data in a database.

  • DML commands include INSERT, UPDATE, DELETE, and SELECT.

  • INSERT is used to add new rows of data into a table.

  • UPDATE is used to modify existing data in a table.

  • DELETE is used to remove rows of data from a table.

  • SELECT is used to retrieve data from a database.

Add your answer

Q168. what is execution plan

Ans.

Execution plan is a roadmap that SQL Server uses to execute a query, showing the steps taken to retrieve data.

  • Execution plan is generated by the query optimizer to determine the most efficient way to execute a query.

  • It shows the order in which tables are accessed, joins are performed, and filters are applied.

  • Execution plan can be viewed using tools like SQL Server Management Studio or by using the EXPLAIN statement in some databases.

Add your answer

Q169. Tell abt curremt project.

Ans.

Currently working on a project to improve the quality of a mobile banking application.

  • Analyzing user feedback to identify common issues

  • Creating test cases to ensure all features work as expected

  • Collaborating with developers to fix bugs and enhance user experience

Add your answer

Q170. How to Patch ESXI ?

Ans.

ESXi can be patched using vSphere Update Manager or by manually downloading and installing patches.

  • Use vSphere Update Manager to scan and remediate hosts

  • Download patches from VMware website and install manually using ESXCLI or vSphere CLI

  • Ensure compatibility of patches with ESXi version and hardware

  • Reboot the host after patch installation

  • Monitor patch installation progress and verify successful installation

Add your answer

Q171. What is Scrum Management?

Ans.

Scrum is an agile project management framework that emphasizes teamwork, accountability, and iterative progress toward a well-defined goal.

  • Scrum is used to manage complex projects

  • It involves a team-based approach to project management

  • It emphasizes on iterative and incremental progress

  • It involves daily stand-up meetings, sprint planning, and sprint reviews

  • It promotes transparency, inspection, and adaptation

  • Examples of Scrum tools include Jira, Trello, and Asana

Add your answer

Q172. What is load balancer ?

Add your answer

Q173. Types of dimensions, sql queries

Ans.

Dimensions in SQL are of two types: Fact and Dimension. SQL queries are used to retrieve data from a database.

  • Fact dimensions contain numeric values and are used to measure the performance of a business process.

  • Dimension tables contain descriptive attributes and are used to filter and group data.

  • SQL queries can be used to retrieve data from one or more tables using various clauses like SELECT, FROM, WHERE, GROUP BY, HAVING, and ORDER BY.

  • Examples of SQL queries include SELECT ...read more

Add your answer

Q174. Write sql using joins..

Ans.

SQL joins are used to combine rows from two or more tables based on a related column between them.

  • Use INNER JOIN to return rows when there is at least one match in both tables

  • Use LEFT JOIN to return all rows from the left table and the matched rows from the right table

  • Use RIGHT JOIN to return all rows from the right table and the matched rows from the left table

  • Use FULL JOIN to return rows when there is a match in one of the tables

Add your answer

Q175. What is cursor and it's use

Ans.

A cursor is a database object used to retrieve and manipulate data in a database management system.

  • A cursor allows for sequential processing of query results one row at a time.

  • It can be used to update or delete specific rows in a result set.

  • Cursors are commonly used in stored procedures and triggers.

  • Example: DECLARE cursor_name CURSOR FOR SELECT column1, column2 FROM table_name;

Add your answer

Q176. What is CDS?

Add your answer

Q177. What is VAR?

Add your answer

Q178. What are tools used

Ans.

Tools used in software development include IDEs, version control systems, testing frameworks, and project management tools.

  • Integrated Development Environments (IDEs) such as Eclipse, Visual Studio, and IntelliJ IDEA

  • Version control systems such as Git, SVN, and Mercurial

  • Testing frameworks such as JUnit, NUnit, and Selenium

  • Project management tools such as JIRA, Trello, and Asana

Add your answer

Q179. Dom Sanitizer in Angular

Ans.

DOM sanitizer in Angular is used to sanitize untrusted HTML to prevent XSS attacks.

  • DOM sanitizer is used to sanitize HTML content before rendering it in Angular templates.

  • It helps prevent Cross-Site Scripting (XSS) attacks by removing potentially harmful content.

  • Angular provides a built-in DomSanitizer service for sanitizing HTML content.

  • Example: Using DomSanitizer in Angular template to sanitize a URL before rendering it.

Add your answer

Q180. Tools, technology, Framework used

Ans.

I have experience using tools such as Selenium, JIRA, and TestNG, along with knowledge of Agile and Waterfall methodologies.

  • Selenium for automated testing

  • JIRA for defect tracking and project management

  • TestNG for test case management

  • Knowledge of Agile and Waterfall methodologies

Add your answer

Q181. Why Synechron?

Ans.

Synechron is a leading digital consulting firm with a strong focus on innovation and cutting-edge technology solutions.

  • Synechron has a reputation for delivering high-quality digital solutions to clients across various industries.

  • The company values innovation and encourages employees to think outside the box.

  • Synechron offers opportunities for professional growth and development through training and mentorship programs.

Add your answer

Q182. What is type in ts

Ans.

Type in TypeScript refers to the static type of a variable, function, or object.

  • Type in TypeScript helps catch errors at compile time by specifying the data type of variables.

  • Types in TypeScript include basic types like number, string, boolean, as well as custom types like interfaces and enums.

  • Example: let age: number = 25;

Add your answer

Q183. What is interceptor

Ans.

An interceptor is a middleware component that intercepts incoming and outgoing HTTP requests in an application.

  • Interceptors can be used for logging, authentication, error handling, and modifying requests/responses.

  • In Angular, interceptors can be used to modify HTTP requests before they are sent to the server.

  • In Spring framework, interceptors can be used to intercept client requests and server responses.

  • Interceptors are commonly used in web development to add cross-cutting con...read more

Add your answer

Q184. difference between repartition and coalesce

Ans.

Repartition increases or decreases the number of partitions in a DataFrame, while coalesce only decreases the number of partitions.

  • Repartition involves shuffling data across the network, while coalesce tries to minimize shuffling by only creating new partitions if necessary.

  • Repartition is typically used when increasing the number of partitions for parallelism, while coalesce is used for decreasing partitions to optimize performance.

  • Example: df.repartition(10) vs df.coalesce(5...read more

Add your answer

Q185. Etl testing overview

Ans.

ETL testing is the process of verifying the accuracy and completeness of data after it has been extracted, transformed, and loaded into a target system.

  • ETL testing involves validating data at each stage of the ETL process

  • It ensures that data is transformed correctly and loaded into the target system without any errors

  • ETL testing also involves checking for data quality and consistency

  • Examples of ETL testing tools include Informatica PowerCenter, Talend, and IBM InfoSphere Data...read more

Add your answer

Q186. Difference between SVG &amp; CANVAS

Ans.

SVG is a vector-based graphics format while Canvas is a bitmap-based graphics format.

  • SVG uses XML to define graphics and is resolution-independent.

  • SVG elements can be styled with CSS and manipulated with JavaScript.

  • Canvas is a pixel-based grid where graphics are drawn programmatically.

  • Canvas is more suitable for complex animations and real-time rendering.

  • Canvas has better performance for rendering large amounts of data.

Add your answer

Q187. explain burndown chart?

Add your answer

Q188. Write a program to reverse a string

Ans.

Program to reverse a string

  • Create a char array from the input string

  • Use two pointers to swap characters from start and end

  • Continue swapping until pointers meet in the middle

Add your answer

Q189. End to End Recruitment process

Ans.

End to end recruitment process involves sourcing, screening, interviewing, selecting, and onboarding candidates.

  • Sourcing candidates through job portals, social media, referrals, etc.

  • Screening resumes and shortlisting candidates based on job requirements

  • Conducting interviews and assessments to evaluate candidate skills and fit

  • Selecting the best candidate and negotiating salary and benefits

  • Onboarding the candidate and ensuring a smooth transition into the company

Add your answer

Q190. Find second largest salary using sql

Ans.

Use SQL query with ORDER BY and LIMIT to find second largest salary.

  • Use SELECT statement to retrieve the salary column from the table.

  • Use ORDER BY clause to sort the salaries in descending order.

  • Use LIMIT 1,1 to skip the first highest salary and retrieve the second highest salary.

Add your answer

Q191. Java 8 features.

Ans.

Java 8 introduced several new features including lambda expressions, streams, and default methods.

  • Lambda expressions allow for functional programming and simplify code.

  • Streams provide a way to process collections of data in a functional way.

  • Default methods allow for adding new methods to interfaces without breaking existing implementations.

  • Other features include the Optional class, Date and Time API, and Nashorn JavaScript engine.

Add your answer

Q192. what is trigger

Ans.

A trigger is a special type of stored procedure that automatically executes when certain events occur in a database.

  • Triggers can be used to enforce business rules, maintain referential integrity, and automate repetitive tasks.

  • Examples of trigger events include INSERT, UPDATE, and DELETE operations on a table.

  • Triggers can be defined to execute before or after the triggering event.

Add your answer

Q193. how many types of pipe

Ans.

There are two types of pipes: named pipes and anonymous pipes.

  • Named pipes are used for communication between processes on different computers or on the same computer.

  • Anonymous pipes are used for communication between processes on the same computer.

  • Named pipes have a unique name and can be accessed by any process that knows the name.

  • Anonymous pipes are created by a process and can only be accessed by that process and its child processes.

  • Both types of pipes are used for inter-p...read more

Add your answer

Q194. what is Hoisting in js

Ans.

Hoisting is a JavaScript mechanism where variables and function declarations are moved to the top of their scope.

  • Hoisting applies to variable declarations and function declarations

  • Variables declared with var are hoisted to the top of their scope

  • Function declarations are hoisted before variables

  • Function expressions are not hoisted

  • Hoisting can lead to unexpected behavior and should be avoided

Add your answer

Q195. Partitioning a large Database.

Ans.

Partitioning a large database involves dividing the data into smaller chunks to improve performance and manageability.

  • Identify key columns for partitioning, such as date ranges or customer IDs.

  • Choose a partitioning strategy, such as range partitioning or hash partitioning.

  • Implement partitioning using database features like table partitioning in Oracle or partitioned tables in PostgreSQL.

Add your answer

Q196. Collection’s framework

Ans.

Collection's framework is a set of interfaces and classes that provide high-performance, high-quality implementations of data structures.

  • Provides interfaces like List, Set, Map for storing and manipulating collections of objects

  • Includes classes like ArrayList, LinkedList, HashSet, HashMap for concrete implementations

  • Allows for easy iteration, sorting, searching, and manipulation of collections

  • Supports generics to ensure type safety and compatibility

Add your answer

Q197. Palindrome program in java

Ans.

A palindrome program in Java checks if a given string reads the same forwards and backwards.

  • Create a function that takes a string input

  • Use a loop to compare characters from both ends of the string

  • Return true if the string is a palindrome, false otherwise

Add your answer

Q198. Diamond problem in java

Ans.

Diamond problem in Java occurs when a class inherits from two classes that have a common ancestor, resulting in ambiguity.

  • Diamond problem arises in multiple inheritance scenarios in Java.

  • It occurs when a class inherits from two classes that have a common ancestor.

  • To resolve the diamond problem, Java does not support multiple inheritance through classes, but it can be achieved using interfaces.

  • Example: Class A and Class B both inherit from Class C, and Class D inherits from bo...read more

Add your answer

Q199. what is Broadcast join

Ans.

Broadcast join is a type of join operation in big data processing where one of the datasets is small enough to be broadcasted to all nodes in the cluster.

  • Used when one dataset is small enough to fit in memory of all nodes

  • Reduces shuffling of data across the network

  • Improves performance by avoiding data transfer over the network

Add your answer

Q200. what is spark architecture

Ans.

Spark architecture is a distributed computing framework that consists of a cluster manager and worker nodes.

  • Consists of a cluster manager (e.g. Spark Standalone, YARN, Mesos) for resource management

  • Worker nodes execute tasks and store data in memory or disk

  • Supports various programming languages like Scala, Java, Python, and SQL

  • Uses Resilient Distributed Datasets (RDDs) for fault-tolerant distributed data processing

Add your answer
1
2
3
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Bazoki

based on 296 interviews
Interview experience
3.8
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.8
 • 3.9k Interview Questions
3.8
 • 211 Interview Questions
4.0
 • 193 Interview Questions
4.2
 • 173 Interview Questions
4.1
 • 148 Interview Questions
3.7
 • 140 Interview Questions
View all
Top Synechron Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter