TCS
100+ Soft Suave Technologies Interview Questions and Answers
Q1. 1. What is the velocity trend? 2. Metrics used in scrum framework 3. Type of conflicts and how to resolve them 4. INVEST model used for the creation of user stories 5. Explain about 'DOD' and 'DOR'? 6. Explain...
read moreAnswers to various questions related to Scrum framework and Agile methodology.
Velocity trend is the rate at which the team is delivering the product increment.
Metrics used in Scrum framework include burndown chart, velocity, sprint goal, etc.
Types of conflicts in Scrum are personal, technical, and domain-related. They can be resolved through communication, negotiation, and compromise.
INVEST model is used for creating user stories that are Independent, Negotiable, Valuable, Es...read more
Q2. What are the high availability concepts you have in your currect project
Implemented load balancing and failover mechanisms using AWS services.
Used Amazon Elastic Load Balancer to distribute traffic across multiple instances.
Configured Auto Scaling groups to automatically launch new instances in case of failure.
Implemented Multi-AZ deployment for RDS instances to ensure high availability of database.
Used Route 53 for DNS failover to redirect traffic to healthy instances in case of failure.
Implemented S3 cross-region replication for disaster recove...read more
Q3. What is data sparsity and how to handle it ? How to avoid dollar tables creation in a loading in ODI
Data sparsity refers to the situation where a large portion of data is missing or empty. To handle it, techniques like data imputation or interpolation can be used. Dollar tables can be avoided in ODI loading by using appropriate mappings and transformations.
Data sparsity occurs when there are missing or empty values in a dataset.
To handle data sparsity, techniques like data imputation or interpolation can be used to fill in the missing values.
Data imputation involves estimat...read more
Q4. How to call two load plan in parallel ? And make it wait if needed .
To call two load plans in parallel and make them wait if needed, use a parallel step and a wait step.
Create a parallel step in the load plan
Add the two load plans as child steps to the parallel step
Create a wait step after the parallel step
Set the wait step to wait for completion of the parallel step
Adjust the wait time as needed
Q5. BDD framework, How to pass input data into function using BDD, how to identify failed test cases and rerun
To pass input data into function using BDD, use scenario outline and data tables. To identify failed test cases and rerun, use test runners.
Use scenario outline and data tables to pass input data into function using BDD
Identify failed test cases using test runners like Cucumber or Behave
Rerun failed test cases using the rerun feature in the test runner
Use hooks in the BDD framework to perform actions before and after each scenario
Example: Given a scenario outline with a data ...read more
Q6. What is CAA and what is the basic framework of CAA
CAA stands for Civil Aviation Authority. It is the regulatory body for aviation safety in the UK.
CAA is responsible for ensuring the safety of civil aviation in the UK
It sets standards for aircraft design, maintenance, and operation
CAA issues licenses to pilots, air traffic controllers, and other aviation professionals
It also regulates airports and air traffic services
Examples of CAA regulations include the Air Navigation Order and the Civil Aviation Regulations
Q7. What is direct path read and write in Oracle ? It's use case and pros and cons ?
Direct path read and write is a method of reading and writing data in Oracle without using buffer cache.
Direct path read and write is faster than traditional read and write methods.
It is useful for large data sets that do not fit in buffer cache.
Direct path read and write bypasses buffer cache, reducing memory usage.
However, it can cause increased I/O and CPU usage.
Direct path write is commonly used for bulk inserts, while direct path read is used for full table scans.
Direct ...read more
Q8. 4. Where did you implement overriding and overloading in your framework.
Overriding and overloading were implemented in various parts of the framework.
Overriding was implemented in the base class to allow derived classes to provide their own implementation of a method.
Overloading was implemented in various methods to allow for multiple versions of the same method with different parameters.
Examples of overriding and overloading can be found in the class hierarchy for handling different types of data.
Overriding can also be seen in the implementation...read more
Q9. Have you ever done end to end implementation of any solution
Yes, I have done end to end implementation of various solutions.
I have implemented a CRM solution for a client from requirement gathering to deployment.
I have also implemented an ERP solution for a manufacturing company.
I have experience in implementing various software solutions for different industries.
I follow a structured approach to ensure successful implementation.
I work closely with the client to understand their requirements and provide customized solutions.
Q10. 5. Why did you opted protractor for your project to automate testing.
Protractor was chosen for its compatibility with AngularJS and its ability to handle asynchronous testing.
Protractor is designed specifically for AngularJS applications
It uses WebDriverJS to interact with the browser and simulate user actions
Protractor can handle asynchronous testing, which is common in AngularJS applications
It has built-in support for Angular-specific locator strategies
Example: Protractor was used to automate testing for an AngularJS e-commerce website
Q11. 7. What is your understanding on CSS v/s xpath as locator.
CSS and XPath are both locators used in Selenium for web automation.
CSS is faster and more readable than XPath.
XPath is more powerful and flexible than CSS.
CSS is recommended for simple locators like class, id, tag name.
XPath is recommended for complex locators like nested elements, dynamic attributes.
CSS locators are more stable than XPath as they are less likely to break with changes in the DOM.
XPath locators are more reliable than CSS when working with older browsers.
Both ...read more
Q12. How do you troubleshoot Performance tuning
Performance tuning troubleshooting involves identifying bottlenecks and optimizing system resources.
Identify the bottleneck by monitoring system resources such as CPU, memory, disk I/O, and network usage.
Analyze application and database performance metrics to identify slow queries or inefficient code.
Optimize system resources by adjusting configuration settings, upgrading hardware, or implementing caching mechanisms.
Test and validate performance improvements to ensure they ha...read more
Q13. 1. How do you perform parallel testing in selenium.
Parallel testing in Selenium can be performed using Selenium Grid or cloud-based testing platforms.
Selenium Grid allows for parallel execution of tests on multiple machines or browsers simultaneously.
Cloud-based testing platforms like Sauce Labs or BrowserStack provide access to a large number of virtual machines for parallel testing.
Parallel testing can significantly reduce test execution time and improve test coverage.
Test scripts should be designed to be thread-safe and no...read more
Q14. ODI file wait - how does it work ?
ODI file wait is a feature that allows ODI to wait for a file to be available before proceeding with the execution of a task.
ODI file wait is configured in the ODI topology manager
It can be used in scenarios where a file needs to be processed before continuing with the task
ODI file wait can be set to wait for a specific file name or a file pattern
It can also be configured to wait for a specific amount of time before timing out
Once the file is available, ODI will proceed with ...read more
Q15. 2. How do you manage automation testing in an agile project.
Automation testing in agile project is managed by continuous integration, frequent testing, and collaboration.
Use continuous integration to ensure that automated tests are run frequently and consistently.
Collaborate with developers and testers to ensure that automated tests are integrated into the development process.
Use tools like Selenium, Appium, and JUnit to automate testing.
Ensure that automated tests are written in a way that is maintainable and scalable.
Use test-driven...read more
Q16. Technology on which worked and the work you perform daily basis
I work with various technologies on a daily basis, including Java, Python, and SQL.
I have experience with Java programming and use it frequently for developing applications.
I also work with Python for data analysis and machine learning tasks.
SQL is another technology I use regularly for managing and querying databases.
I am familiar with various software development tools such as Git, JIRA, and Jenkins.
I stay up-to-date with the latest technologies and trends in the industry t...read more
Q17. How did you increase the revenues of the company in cyber security.
I increased revenues in cyber security by implementing targeted marketing campaigns and offering customized solutions to clients.
Implemented targeted marketing campaigns to reach potential clients in need of cyber security services
Offered customized solutions to clients based on their specific needs and budget constraints
Expanded service offerings to include additional cyber security solutions such as penetration testing and incident response
Established partnerships with othe...read more
Q18. What have you done in OAF personalization and Forms personalization?
I have experience in OAF personalization and Forms personalization.
In OAF personalization, I have customized the user interface by adding new fields, modifying existing fields, and creating custom pages.
In Forms personalization, I have created custom triggers, added validation rules, and modified the behavior of standard forms.
For example, in OAF personalization, I added a new field to the employee details page to capture additional information.
In Forms personalization, I cre...read more
Q19. 3. Tell me difference between list and set and implementation in selenium.
List and Set are data structures in Java. List allows duplicates while Set does not.
List is an ordered collection while Set is not.
List allows null values while Set does not.
In Selenium, we can use List
to store a collection of web elements and Set to store a collection of unique strings. Example: List
names = new ArrayList<>(); Set numbers = new HashSet<>(); List has methods like add(), remove(), get() while Set has methods like add(), remove(), contains().
Q20. 6. How will you rerun failed tests in selenium?
Failed tests in Selenium can be rerun using TestNG or JUnit frameworks.
Use TestNG or JUnit frameworks to rerun failed tests.
In TestNG, use the 'retryAnalyzer' attribute to specify the retry analyzer class.
In JUnit, use the '@RetryTest' annotation to specify the number of times to retry the test.
Configure the maximum number of retries and the delay between retries.
Use a test listener to log the results of the rerun.
Q21. What is the difference between CSS selector and XPath
CSS selector is used to select HTML elements based on their id, class, attributes, etc. XPath is a language for navigating XML documents.
CSS selector is more commonly used for selecting elements in HTML documents.
XPath is more powerful and flexible, allowing for more complex selection of elements.
CSS selector is easier to read and write for simple selections.
XPath can traverse both upwards and downwards in the document tree.
CSS selector example: div.container > p
XPath example...read more
Q22. Difference between == and equals method in String comparision
The == operator compares the reference of two String objects, while the equals() method compares their values.
The == operator checks if two String objects refer to the same memory location.
The equals() method checks if two String objects have the same sequence of characters.
Using == for String comparison can lead to unexpected results.
Example: String str1 = "hello"; String str2 = "hello"; str1 == str2 will return true because they refer to the same memory location, but str1.e...read more
Q23. Can you provide more details about the Change Management process?
Change Management process involves planning, implementing, and monitoring changes to ensure successful outcomes.
Change Management process includes identifying the need for change, assessing the impact, planning the change, implementing the change, and evaluating the results.
Communication is key in Change Management to ensure stakeholders are informed and involved throughout the process.
Resistance to change is common and should be addressed through effective communication and ...read more
Q24. 9. Tell me different response status codes of REST of APIs and their meaning.
Response status codes of REST APIs and their meanings.
200 OK - Successful request
201 Created - New resource created
400 Bad Request - Invalid request
401 Unauthorized - Authentication failed
403 Forbidden - Authorization failed
404 Not Found - Resource not found
500 Internal Server Error - Server error
Q25. Difference between always on and clustering
Always On is a high availability feature in SQL Server that provides automatic failover, while clustering is a group of servers working together to provide high availability.
Always On is a feature in SQL Server that provides automatic failover and disaster recovery capabilities
Clustering is a group of servers working together to provide high availability and load balancing
Always On is specific to SQL Server, while clustering can be used in various technologies
Always On requir...read more
Q26. How to handle complex file in ODI ?
Complex files in ODI can be handled by using various techniques.
Use ODI's built-in file handling capabilities
Use custom Java code to handle complex file formats
Use third-party tools like Apache Nifi or Talend to preprocess the files
Use ODI's knowledge modules to transform the data into a more manageable format
Use ODI's parallel processing capabilities to speed up the processing of large files
Q27. How to perform DR activity in case of backup servers down?
Perform DR activity by activating the secondary backup servers.
Activate the secondary backup servers and restore data from the latest backup
Ensure that all necessary applications and services are running on the secondary servers
Test the restored data and applications to ensure they are functioning properly
Update DNS records and routing to direct traffic to the secondary servers
Monitor the secondary servers closely to ensure they are handling the load properly
Q28. What is the structure of a war file if you unzip it.?
A war file is a compressed file format used to package Java web applications.
A war file contains web application components such as servlets, JSPs, HTML pages, and other resources.
The file structure includes a WEB-INF directory containing web.xml deployment descriptor, lib directory containing JAR files, and classes directory containing compiled Java classes.
The war file can be unzipped using any standard zip utility.
Example: sample.war file unzipped will have a directory str...read more
Q29. What is the difference between cache and persist in Spark?
Cache and persist are both used for optimizing Spark performance by storing intermediate results in memory, but persist allows for more customization.
Cache() is a shorthand for persist(StorageLevel.MEMORY_ONLY)
Persist() allows for specifying different storage levels such as MEMORY_ONLY, MEMORY_AND_DISK, etc.
Persist() also allows for specifying serialization formats like Java, Kryo, etc.
Q30. Write a selenium java code to identify broken links on a web page
Use Selenium Java code to identify broken links on a web page
Create a WebDriver instance using Selenium
Find all the links on the web page using findElements method
Iterate through each link and check for response code using HttpURLConnection class
Identify links with response code other than 200 as broken links
Q31. What are the different types and their process?
There are different types of consultants such as management, IT, financial, and HR consultants, each with their own unique processes.
Management consultants help organizations improve their performance through analysis and strategy implementation.
IT consultants provide technology solutions and support to businesses.
Financial consultants offer advice on financial planning, investments, and risk management.
HR consultants assist with human resource management, including recruitme...read more
Q32. What are the methods for Requirements Gathering?
Methods for gathering requirements include interviews, surveys, observation, and prototyping.
Interviews with stakeholders to understand their needs and expectations
Surveys to gather feedback from a larger group of people
Observation of current processes and workflows
Prototyping to test and refine ideas
Brainstorming sessions to generate new ideas
Focus groups to gather feedback from a specific target audience
Document analysis to review existing documentation
JAD sessions to bring...read more
Q33. Why do you choose TCS
I chose TCS because of its global presence, diverse opportunities, and strong reputation in the industry.
TCS has a strong global presence with offices in over 46 countries, providing opportunities to work on international projects and collaborate with diverse teams.
TCS offers a wide range of career opportunities across various industries, allowing me to explore different domains and develop a versatile skillset.
TCS has a strong reputation in the IT industry, known for its inn...read more
Q34. How do you fine tune the query
To fine tune a query, optimize the database, use indexes, limit the result set, and use appropriate joins.
Optimize the database by removing unnecessary data and improving data structure
Use indexes to speed up data retrieval
Limit the result set by using WHERE clause and pagination
Use appropriate joins to minimize the number of rows returned
Consider using caching to reduce database load
Q35. How we handle different situations during project life cycle
We handle different situations during project life cycle by identifying the issue, analyzing it, and implementing a solution.
Identify the issue or problem
Analyze the situation and gather information
Develop a plan of action
Implement the solution
Monitor and evaluate the results
Adjust the plan as necessary
Q36. Tell me about your automation test framwork
My automation test framework is built using Selenium WebDriver and TestNG for web applications.
Utilizes Selenium WebDriver for interacting with web elements
Uses TestNG for test case management and reporting
Includes page object model design pattern for better code organization
Integration with CI/CD tools like Jenkins for automated test execution
Q37. Why String is Immutable. Explain with code.
String is immutable in Java to ensure security, thread safety, and optimization.
String objects are stored in the String pool, which helps in memory optimization.
Immutable strings are thread-safe, as their values cannot be changed once created.
String immutability prevents malicious code from modifying sensitive data.
Example: String str = "Hello"; str.concat(" World"); // This does not change the original string value.
Q38. What are the RICE objects you have worked on.
I have worked on RICE objects for various modules including FI, MM, and SD.
Developed custom reports using ALV and Smart Forms for FI module
Created custom transactions for MM module using BDC and BAPI
Enhanced standard SD transactions using user exits and BADI
Implemented custom workflows using SAP Workflow for various modules
Developed custom interfaces using IDOCs and RFCs
Q39. Write code for setters and getters methods
Code for setters and getters methods
For each instance variable, create a setter and getter method
Setters should take in a parameter and assign it to the instance variable
Getters should return the value of the instance variable
Naming convention for setters and getters should follow camelCase
Q40. What are the different types of network topology?
Different types of network topology include bus, star, ring, mesh, and hybrid.
Bus Topology: All devices are connected to a central cable, like a bus route.
Star Topology: All devices are connected to a central hub.
Ring Topology: Each device is connected to two other devices, forming a ring.
Mesh Topology: Every device is connected to every other device.
Hybrid Topology: Combination of two or more different types of topologies.
Q41. Where string memories are allocated
String memories are allocated in different places depending on the programming language and platform.
In C, string memories are allocated on the stack or heap depending on how they are declared.
In Java, string memories are allocated on the heap.
In Python, string memories are allocated on the heap and are managed by the interpreter.
In JavaScript, string memories are allocated on the heap and are managed by the garbage collector.
Q42. How load large file in ODI ?
Large files can be loaded in ODI using various techniques such as partitioning, chunking, and parallel processing.
Use partitioning to divide the large file into smaller chunks and load them in parallel
Chunking involves breaking the large file into smaller pieces and loading them sequentially
Parallel processing can be used to load multiple chunks of the file simultaneously
ODI also supports external tables, which can be used to load data from large files stored outside the data...read more
Q43. What are the inspection types in SAP QM?
Inspection types in SAP QM include goods receipt inspection, goods issue inspection, and in-process inspection.
Goods receipt inspection is used to inspect materials received from vendors
Goods issue inspection is used to inspect materials before they are issued to production
In-process inspection is used to inspect materials during the production process
Q44. Explain rank dense rank and ntile function with example
Rank, dense rank, and ntile functions are used in SQL to assign a ranking to rows based on a specified criteria.
Rank function assigns a unique rank to each row based on the specified criteria.
Dense rank function assigns a unique rank to each row, but does not leave gaps in the ranking sequence.
Ntile function divides the result set into a specified number of groups and assigns a group number to each row.
Example: SELECT name, salary, RANK() OVER (ORDER BY salary DESC) AS rank F...read more
Q45. How does consistent JKM works ?
Consistent JKM ensures uniformity in the execution of tasks and processes.
JKM stands for Job Knowledge Management
Consistent JKM involves documenting and sharing best practices
It helps in reducing errors and improving efficiency
For example, a consistent JKM approach in software development would involve using the same coding standards and tools across the team
Q46. Performance issues in production environments and fix?
Performance issues in production environments are common and can be fixed by identifying the root cause, optimizing code, tuning database queries, and monitoring system resources.
Identify the root cause of the performance issue by analyzing logs, monitoring tools, and user reports.
Optimize code by removing unnecessary loops, improving algorithms, and reducing database calls.
Tune database queries by adding indexes, optimizing joins, and caching query results.
Monitor system res...read more
Q47. How do we take screenshot in Selenium
Screenshots in Selenium can be taken using the getScreenshotAs method of the WebDriver interface.
Use the getScreenshotAs method of the WebDriver interface to capture the screenshot.
Save the screenshot as a file using the FileUtils class.
Handle exceptions like IOException when saving the screenshot.
Q48. How will you automation drop down
To automate a drop down, you can use tools like Selenium WebDriver to interact with the drop down element and select options programmatically.
Use Selenium WebDriver to locate the drop down element on the webpage
Identify the options within the drop down using findElements method
Use select class in Selenium to interact with the drop down and select desired option
Q49. Different methods available in Alert class
The Alert class in Java provides different methods to display alerts or messages to the user.
The showMessageDialog() method displays a message dialog with an OK button.
The showConfirmDialog() method displays a confirmation dialog with Yes/No buttons.
The showOptionDialog() method displays a customized dialog with options to choose from.
The showInputDialog() method displays an input dialog to get input from the user.
The showErrorDialog() method displays an error dialog with an ...read more
Q50. How do you prioritize the Requirements?
Requirements are prioritized based on their importance and impact on project goals.
Identify critical requirements that are necessary for project success
Consider the impact of each requirement on project timelines and budget
Involve stakeholders in the prioritization process
Use a scoring system to rank requirements based on their importance
Revisit and adjust priorities as needed throughout the project
Q51. Difference between static look up and dynamic look up
Static look up is done at compile time while dynamic look up is done at runtime.
Static look up is determined at compile time based on the code structure.
Dynamic look up is determined at runtime based on the actual data or conditions.
Example: Static look up in a switch statement with fixed cases, dynamic look up in a database query with changing parameters.
Q52. Difference btw M365 and office 365 basic understanding of technology
M365 and Office 365 are both productivity suites, but M365 includes additional features like Windows 10 and Enterprise Mobility + Security.
M365 includes Office 365, Windows 10, and Enterprise Mobility + Security.
Office 365 is focused on cloud-based productivity tools like Word, Excel, and PowerPoint.
M365 offers advanced security and device management capabilities.
Office 365 plans are available for personal, business, and enterprise use.
M365 is designed for businesses and incl...read more
Q53. How do you create a custom annotations?
Custom annotations can be created using the @interface keyword in Java.
Create a new interface with the @interface keyword
Define the annotation's properties using methods
Add default values for the properties
Add the @Retention and @Target annotations to specify how the annotation can be used
Example: @interface MyAnnotation { String value() default ""; }
Example usage: @MyAnnotation(value="example")
Q54. What is dynamic modification rule?
Dynamic modification rule is a rule that allows changes to be made to a system or process in real-time based on certain conditions.
Dynamic modification rules are used in various industries to automate processes and improve efficiency.
These rules can be programmed to trigger specific actions based on predefined criteria.
For example, in e-commerce, a dynamic modification rule can adjust pricing based on demand or competitor prices.
In healthcare, dynamic modification rules can b...read more
Q55. Mail flow in hybrid deployment.
Mail flow in hybrid deployment
In hybrid deployment, mail flow can be routed through on-premises Exchange servers or Exchange Online
Mail can be sent between on-premises and cloud mailboxes using connectors
Exchange Online Protection (EOP) can be used for inbound and outbound mail filtering
Transport Layer Security (TLS) can be used to secure mail flow between on-premises and cloud
Mail can be redirected to on-premises servers for compliance or archiving purposes
Q56. Pivot command in SQL ? Running total ?
Pivot command in SQL is used to transform rows into columns. Running total is a cumulative sum of values.
Pivot command is used to aggregate data and display it in a more readable format
Running total is calculated by adding the current value to the previous total
Example of pivot command: SELECT * FROM table_name PIVOT (SUM(column_name) FOR pivot_column IN (value1, value2, value3))
Example of running total: SELECT column_name, SUM(column_name) OVER (ORDER BY column_name) AS runn...read more
Q57. Project handling major issues found and fix?
Handling major project issues involves identifying, prioritizing, and resolving them efficiently to ensure project success.
Identify major issues through regular project monitoring and communication with team members and stakeholders
Prioritize issues based on impact on project timeline, budget, and overall success
Develop a plan to address each major issue, involving relevant team members and stakeholders
Implement solutions in a timely manner to minimize project delays and risk...read more
Q58. Explain the basic pillars of Cyber Security
The basic pillars of Cyber Security include confidentiality, integrity, availability, and non-repudiation.
Confidentiality: Ensuring that data is only accessible to authorized individuals or systems.
Integrity: Ensuring that data is accurate and has not been tampered with.
Availability: Ensuring that data and systems are accessible when needed.
Non-repudiation: Ensuring that a sender cannot deny sending a message and a recipient cannot deny receiving it.
Q59. How does garbage collection work in Java
Garbage collection in Java automatically manages memory by reclaiming unused objects.
Garbage collection runs in the background to identify and remove objects that are no longer needed.
It helps prevent memory leaks and optimize memory usage.
Java uses different garbage collection algorithms like Serial, Parallel, CMS, and G1.
Example: System.gc() can be used to suggest garbage collection, but it's not guaranteed to run immediately.
Q60. Connectors in Office 365
Connectors in Office 365 allow users to integrate third-party apps and services with their Office 365 accounts.
Connectors can be used to receive notifications and updates from external sources directly in Office 365.
Examples of connectors include Twitter, Trello, and GitHub.
Connectors can be added to individual channels in Microsoft Teams.
Users can also create custom connectors using Microsoft Power Automate.
Connectors can improve productivity and streamline workflows by brin...read more
Q61. What is SQL explain in detail
SQL is a programming language used for managing and manipulating relational databases.
SQL stands for Structured Query Language.
It is used to communicate with databases to perform tasks such as querying data, updating data, and creating databases.
SQL statements are used to perform tasks like selecting data from a database table, inserting new records, updating existing records, and deleting records.
Examples of SQL commands include SELECT, INSERT, UPDATE, DELETE, CREATE, and DR...read more
Q62. What is Zero Threat vulnerability
Zero Threat vulnerability refers to a security flaw that poses no immediate risk or harm to a system.
Zero Threat vulnerabilities are typically low severity issues that do not have the potential to be exploited by attackers.
These vulnerabilities may still need to be addressed to maintain a secure system, but they are not urgent.
Examples of Zero Threat vulnerabilities include unused ports left open on a firewall or outdated software that is not actively being targeted by attack...read more
Q63. 4xx status codes in API testing
4xx status codes indicate client errors in API testing.
4xx status codes are returned by the server when the client has made an error in the request.
Some common 4xx status codes include 400 Bad Request, 401 Unauthorized, 403 Forbidden, and 404 Not Found.
API testers should verify that the correct 4xx status code is returned for each type of client error.
Proper handling of 4xx status codes can improve the user experience and prevent security vulnerabilities.
Q64. Advanced level of functional testing lead
An advanced level functional testing lead is responsible for overseeing and executing complex functional testing processes.
Experience in leading and coordinating functional testing efforts
Ability to create detailed test plans and test cases
Strong understanding of testing methodologies and tools
Excellent communication and problem-solving skills
Experience with automation testing tools like Selenium or JUnit
Q65. Difference between Interface and abstract class
An abstract class can have both abstract and non-abstract methods, while an interface can only have abstract methods.
An abstract class can have constructors, while an interface cannot.
A class can implement multiple interfaces, but can only inherit from one abstract class.
An abstract class can have instance variables, while an interface cannot.
An abstract class can provide default implementations for some methods, while an interface cannot.
An abstract class is used when a comm...read more
Q66. Test case execution order in TestNG
TestNG allows test case execution order to be specified using priority attribute or by using dependsOnMethods attribute.
TestNG executes test cases in the order specified by priority attribute.
If priority attribute is not specified, TestNG executes test cases in alphabetical order of method names.
TestNG also allows test case execution order to be specified using dependsOnMethods attribute.
dependsOnMethods attribute specifies the methods that a test method depends on and TestNG...read more
Q67. 10. Explain your automation framework.
Our automation framework is a hybrid framework that combines data-driven and keyword-driven approaches.
We use Excel sheets to store test data and test cases.
We have a centralized repository for reusable functions and libraries.
We use Selenium WebDriver for web automation and Appium for mobile automation.
We have a reporting mechanism that generates reports in HTML format.
We have integrated our framework with Jenkins for continuous integration.
We follow the Page Object Model de...read more
Q68. What is Informatica architecture
Informatica architecture refers to the structure and components of the Informatica platform for data integration and management.
Informatica architecture consists of various components such as PowerCenter, PowerExchange, and Data Quality.
PowerCenter is the core component responsible for ETL (Extract, Transform, Load) processes.
PowerExchange enables connectivity to various data sources and targets.
Data Quality ensures data accuracy and consistency.
Informatica architecture allow...read more
Q69. What is TestNG profiling
TestNG profiling is a feature that allows developers to analyze the performance of their test cases and identify bottlenecks.
TestNG profiling helps in identifying slow-running test cases and optimizing them for better performance.
It provides detailed information on the execution time of each test method, helping developers prioritize optimization efforts.
Profiling can be done at the method level, class level, or suite level in TestNG.
Developers can use profiling data to impro...read more
Q70. How to create deduplication policies ?
Deduplication policies can be created by identifying duplicate data and defining rules to handle them.
Identify duplicate data using tools like hashing or comparison algorithms
Define rules for handling duplicates such as keeping the first or last occurrence, or merging them
Consider factors like data type, size, and frequency of occurrence when creating policies
Regularly review and update policies to ensure they are effective
Q71. What is the parameterized jobs
Parameterized jobs allow users to pass parameters to a job when it is executed.
Parameters can be used to customize the behavior of a job
Parameters can be defined in the job configuration
Parameters can be passed through the Jenkins API or command line
Examples include passing a build number or target environment as a parameter
Q72. What is structured array list
A structured array list is a data structure that stores elements of the same data type in contiguous memory locations.
Elements are accessed using an index.
Insertion and deletion operations can be expensive as all elements after the insertion/deletion point need to be shifted.
Examples include ArrayList in Java and List
in C#.
Q73. AAD connect configuration.
AAD connect configuration is used to synchronize on-premises directories with Azure AD.
AAD Connect is used to sync user accounts, passwords, and groups from on-premises AD to Azure AD
It can be configured to filter which objects are synced
It supports multiple forest and domain configurations
It can be set up for password writeback and seamless single sign-on
It requires a service account with appropriate permissions in on-premises AD
It can be monitored and managed through the Az...read more
Q74. What are Java 8 features?
Java 8 introduced several new features including lambda expressions, streams, functional interfaces, and default methods.
Lambda expressions allow you to write code in a more concise and readable way.
Streams provide a way to work with sequences of elements and perform operations on them.
Functional interfaces are interfaces with a single abstract method, which can be implemented using lambda expressions.
Default methods allow interfaces to have method implementations.
Other featu...read more
Q75. Difference between different select query
Different select queries have different purposes and syntax.
SELECT retrieves data from one or more tables
DISTINCT removes duplicates from the result set
WHERE filters the result set based on a condition
GROUP BY groups the result set by one or more columns
HAVING filters the result set based on a condition after grouping
ORDER BY sorts the result set by one or more columns
LIMIT limits the number of rows returned
JOIN combines rows from two or more tables based on a related column
Q76. Challenge faced in developing any code
One challenge in developing code is handling complex logic and ensuring its correctness.
Understanding and implementing complex requirements
Managing dependencies and integrating different components
Testing and debugging to ensure correctness
Optimizing code for performance
Maintaining code readability and scalability
Q77. Explain what is abstraction
Abstraction is the process of hiding complex implementation details and exposing only the necessary information.
Abstraction is used to simplify complex systems by breaking them down into smaller, more manageable parts.
It allows us to focus on the essential features of a system while ignoring the non-essential details.
Abstraction can be achieved through the use of abstract classes, interfaces, and encapsulation.
For example, a car can be abstracted as a machine that has an engi...read more
Q78. What is multipathing.
Multipathing is a technique used to provide redundancy and load balancing in storage networks.
Multipathing allows for multiple paths between a server and storage device to be used simultaneously.
It provides redundancy in case of a path failure and load balancing to optimize performance.
Multipathing is commonly used in Fibre Channel and iSCSI storage networks.
Examples of multipathing software include MPIO for Windows and PowerPath for EMC storage systems.
Q79. How to reduce LVM partition
To reduce LVM partition, we need to shrink the file system first and then reduce the size of the logical volume.
Shrink the file system using appropriate tools like resize2fs for ext2/3/4 file systems or xfs_growfs for XFS file systems
Reduce the size of the logical volume using lvreduce command
Make sure to take a backup of important data before performing any partition resizing operations
Q80. Program on String reverse and Anagram
Program to reverse strings and check for anagrams in an array of strings.
Create a function to reverse a string by iterating through each character and appending to a new string.
Check if two strings are anagrams by sorting the characters in each string and comparing them.
Iterate through the array of strings and apply the above functions to reverse and check for anagrams.
Q81. Project execution methodology
Project execution methodology refers to the process of planning, organizing, and managing resources to achieve project goals.
It involves defining project scope, objectives, and deliverables
Selecting the appropriate project management approach
Developing a project plan and schedule
Assigning tasks and responsibilities to team members
Monitoring project progress and making necessary adjustments
Examples of project execution methodologies include Agile, Waterfall, and Hybrid
Q82. Disadvantages of Microservice architecture
Microservice architecture has some disadvantages.
Increased complexity in deployment and management
Increased network latency and communication overhead
Difficulties in maintaining data consistency across services
Requires significant investment in infrastructure and tooling
May not be suitable for small or simple applications
Q83. Check constrain in SQL
Check constraint is used to limit the values that can be inserted into a column.
It is a type of constraint in SQL
It is used to limit the values that can be inserted into a column
It is used to ensure data integrity
It can be used to check for a range of values, data types, or conditions
Example: CREATE TABLE Students (id INT, name VARCHAR(50), age INT CHECK (age >= 18));
Q84. What is a servlet actually?
A servlet is a Java program that runs on a web server and handles client requests.
Servlets are used to create dynamic web pages and web applications.
They can handle HTTP requests and responses.
Servlets can be used to process form data, authenticate users, and more.
Examples of servlet containers include Apache Tomcat and Jetty.
Q85. Area of interest
My area of interest is data analysis and visualization.
I have experience using tools like Tableau and Power BI for data visualization.
I enjoy exploring trends and patterns in data to derive insights.
I have worked on projects involving data cleaning, analysis, and presentation.
Q86. Collection in PL SQL
Collection in PL SQL is a data structure that can hold multiple values of the same data type.
Collections can be nested within each other.
PL/SQL provides three types of collections: associative arrays, nested tables, and VARRAYs.
Collections can be used to pass multiple values to a stored procedure or function.
Collections can be used to simplify SQL statements by allowing multiple rows to be returned as a single result set.
Q87. Write code for Explicit wait
Code for Explicit wait in Selenium WebDriver
Import WebDriverWait and ExpectedConditions classes
Specify the maximum time to wait and the polling interval
Use ExpectedConditions methods like elementToBeClickable, visibilityOfElementLocated, etc.
Apply the wait to a specific element or condition
Q88. What is owin.
OWIN stands for Open Web Interface for .NET. It is a standard interface between .NET web servers and web applications.
OWIN decouples the web application from the web server, making it easier to develop and test.
It allows developers to write middleware components that can be used across different web frameworks.
OWIN is used in ASP.NET applications to provide a standard interface for communication between the web server and the application.
Examples of OWIN-compatible web server...read more
Q89. Explain Report Bursting.
Report bursting is a process of delivering personalized reports to multiple recipients based on predefined criteria.
Report bursting is used to distribute a single report to multiple recipients.
It allows for the customization of report content based on recipient-specific data or preferences.
Criteria for report bursting can include recipient roles, departments, locations, or any other relevant attributes.
Reports can be bursted in various formats such as PDF, Excel, or HTML.
Exam...read more
Q90. Explain joins using excel
Joins in Excel are used to combine data from different tables based on a common column.
Joins in Excel are performed using the VLOOKUP, INDEX/MATCH, or Power Query functions.
Common types of joins include inner join, left join, right join, and full outer join.
Joins help in merging data from multiple tables to create a single, unified dataset.
For example, you can use VLOOKUP to combine sales data from one table with customer information from another table.
Q91. Kafka pipeline with database
Using Kafka to create a pipeline with a database for real-time data processing.
Set up Kafka Connect to stream data from database to Kafka topics
Use Kafka Streams to process and analyze data in real-time
Integrate with database connectors like JDBC or Debezium
Ensure data consistency and fault tolerance in the pipeline
Q92. Explain framework worked
A framework is a structured set of guidelines or rules that provide a foundation for developing software applications.
Frameworks provide a structure for developers to build upon, saving time and effort.
They often include pre-written code, libraries, and tools to streamline development.
Frameworks can be specific to a certain programming language or technology, such as Angular for JavaScript or Django for Python.
Q93. Explain plan
Explain plan is a feature in Oracle database that shows the execution plan of a SQL statement.
It helps in identifying the most efficient way to execute a query.
It shows the order in which tables are accessed, join methods used, and access methods used.
It can be generated using the EXPLAIN PLAN statement or through tools like SQL Developer.
The output can be in either text or graphical format.
Q94. New features of dynamics 365
Dynamics 365 has new features for better customer engagement, AI-driven insights, and improved productivity.
Improved integration with LinkedIn Sales Navigator for better lead generation
AI-driven insights for sales and customer service
Improved productivity with new mobile app features
New Dynamics 365 Virtual Agent for Customer Service
Enhanced Dynamics 365 Marketing capabilities
Improved Dynamics 365 Finance and Operations with new features for supply chain management and projec...read more
Q95. Xpath how to find
Xpath is a query language used to navigate through XML documents and locate elements based on their attributes or values.
Use double forward slashes (//) to select all elements in the document
Use square brackets to specify conditions for selecting elements, such as [@attribute='value']
Use the 'text()' function to select elements based on their text content
Use the 'contains()' function to select elements that contain a specific value
Q96. Using sink connectors
Sink connectors are used to connect a sink to the plumbing system, allowing for drainage of water and waste.
Sink connectors come in various sizes and materials to fit different sink and plumbing configurations.
They are typically made of PVC, stainless steel, or brass.
Proper installation of sink connectors is important to prevent leaks and ensure proper drainage.
Examples of sink connectors include P-traps, tailpieces, and extension tubes.
Q97. Why you choose TCS
I chose TCS for its global presence, diverse opportunities, and strong reputation in the industry.
Global presence with offices in multiple countries
Diverse opportunities for career growth and development
Strong reputation in the industry for quality services and innovation
Q98. Explain OOPS Principles
OOPS principles are a set of guidelines that help in designing and implementing object-oriented programs.
Abstraction: Hiding implementation details and showing only necessary information.
Encapsulation: Binding data and functions that manipulate it, into a single unit.
Inheritance: Creating new classes from existing ones, inheriting properties and methods.
Polymorphism: Ability of objects to take on multiple forms, depending on the context.
Examples: Animal class can have subclas...read more
Q99. Fibonacci series in C
Fibonacci series in C is a sequence of numbers where each number is the sum of the two preceding ones.
Declare an array to store the Fibonacci series
Initialize the first two elements of the array as 0 and 1
Use a loop to calculate and store the next elements by adding the previous two elements
Q100. Palindrome series in C
A palindrome series in C is a series of strings that read the same forwards and backwards.
Create an array of strings to store the series
Use a loop to iterate through the series and check if each string is a palindrome
Print or store the palindromic strings
More about working at TCS
Top HR Questions asked in Soft Suave Technologies
Interview Process at Soft Suave Technologies
Reviews
Interviews
Salaries
Users/Month