Add office photos
Engaged Employer

TCS

3.7
based on 86.5k Reviews
Filter interviews by

100+ Soft Suave Technologies Interview Questions and Answers

Updated 24 Dec 2024
Popular Designations

Q1. 1. What is the velocity trend? 2. Metrics used in scrum framework 3. Type of conflicts and how to resolve them 4. INVEST model used for the creation of user stories 5. Explain about 'DOD' and 'DOR'? 6. Explain...

read more
Ans.

Answers to various questions related to Scrum framework and Agile methodology.

  • Velocity trend is the rate at which the team is delivering the product increment.

  • Metrics used in Scrum framework include burndown chart, velocity, sprint goal, etc.

  • Types of conflicts in Scrum are personal, technical, and domain-related. They can be resolved through communication, negotiation, and compromise.

  • INVEST model is used for creating user stories that are Independent, Negotiable, Valuable, Es...read more

Add your answer

Q2. What are the high availability concepts you have in your currect project

Ans.

Implemented load balancing and failover mechanisms using AWS services.

  • Used Amazon Elastic Load Balancer to distribute traffic across multiple instances.

  • Configured Auto Scaling groups to automatically launch new instances in case of failure.

  • Implemented Multi-AZ deployment for RDS instances to ensure high availability of database.

  • Used Route 53 for DNS failover to redirect traffic to healthy instances in case of failure.

  • Implemented S3 cross-region replication for disaster recove...read more

Add your answer

Q3. What is data sparsity and how to handle it ? How to avoid dollar tables creation in a loading in ODI

Ans.

Data sparsity refers to the situation where a large portion of data is missing or empty. To handle it, techniques like data imputation or interpolation can be used. Dollar tables can be avoided in ODI loading by using appropriate mappings and transformations.

  • Data sparsity occurs when there are missing or empty values in a dataset.

  • To handle data sparsity, techniques like data imputation or interpolation can be used to fill in the missing values.

  • Data imputation involves estimat...read more

View 1 answer

Q4. How to call two load plan in parallel ? And make it wait if needed .

Ans.

To call two load plans in parallel and make them wait if needed, use a parallel step and a wait step.

  • Create a parallel step in the load plan

  • Add the two load plans as child steps to the parallel step

  • Create a wait step after the parallel step

  • Set the wait step to wait for completion of the parallel step

  • Adjust the wait time as needed

Add your answer
Discover Soft Suave Technologies interview dos and don'ts from real experiences

Q5. BDD framework, How to pass input data into function using BDD, how to identify failed test cases and rerun

Ans.

To pass input data into function using BDD, use scenario outline and data tables. To identify failed test cases and rerun, use test runners.

  • Use scenario outline and data tables to pass input data into function using BDD

  • Identify failed test cases using test runners like Cucumber or Behave

  • Rerun failed test cases using the rerun feature in the test runner

  • Use hooks in the BDD framework to perform actions before and after each scenario

  • Example: Given a scenario outline with a data ...read more

Add your answer

Q6. What is CAA and what is the basic framework of CAA

Ans.

CAA stands for Civil Aviation Authority. It is the regulatory body for aviation safety in the UK.

  • CAA is responsible for ensuring the safety of civil aviation in the UK

  • It sets standards for aircraft design, maintenance, and operation

  • CAA issues licenses to pilots, air traffic controllers, and other aviation professionals

  • It also regulates airports and air traffic services

  • Examples of CAA regulations include the Air Navigation Order and the Civil Aviation Regulations

Add your answer
Are these interview questions helpful?

Q7. What is direct path read and write in Oracle ? It's use case and pros and cons ?

Ans.

Direct path read and write is a method of reading and writing data in Oracle without using buffer cache.

  • Direct path read and write is faster than traditional read and write methods.

  • It is useful for large data sets that do not fit in buffer cache.

  • Direct path read and write bypasses buffer cache, reducing memory usage.

  • However, it can cause increased I/O and CPU usage.

  • Direct path write is commonly used for bulk inserts, while direct path read is used for full table scans.

  • Direct ...read more

Add your answer

Q8. 4. Where did you implement overriding and overloading in your framework.

Ans.

Overriding and overloading were implemented in various parts of the framework.

  • Overriding was implemented in the base class to allow derived classes to provide their own implementation of a method.

  • Overloading was implemented in various methods to allow for multiple versions of the same method with different parameters.

  • Examples of overriding and overloading can be found in the class hierarchy for handling different types of data.

  • Overriding can also be seen in the implementation...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Have you ever done end to end implementation of any solution

Ans.

Yes, I have done end to end implementation of various solutions.

  • I have implemented a CRM solution for a client from requirement gathering to deployment.

  • I have also implemented an ERP solution for a manufacturing company.

  • I have experience in implementing various software solutions for different industries.

  • I follow a structured approach to ensure successful implementation.

  • I work closely with the client to understand their requirements and provide customized solutions.

Add your answer

Q10. 5. Why did you opted protractor for your project to automate testing.

Ans.

Protractor was chosen for its compatibility with AngularJS and its ability to handle asynchronous testing.

  • Protractor is designed specifically for AngularJS applications

  • It uses WebDriverJS to interact with the browser and simulate user actions

  • Protractor can handle asynchronous testing, which is common in AngularJS applications

  • It has built-in support for Angular-specific locator strategies

  • Example: Protractor was used to automate testing for an AngularJS e-commerce website

Add your answer

Q11. 7. What is your understanding on CSS v/s xpath as locator.

Ans.

CSS and XPath are both locators used in Selenium for web automation.

  • CSS is faster and more readable than XPath.

  • XPath is more powerful and flexible than CSS.

  • CSS is recommended for simple locators like class, id, tag name.

  • XPath is recommended for complex locators like nested elements, dynamic attributes.

  • CSS locators are more stable than XPath as they are less likely to break with changes in the DOM.

  • XPath locators are more reliable than CSS when working with older browsers.

  • Both ...read more

Add your answer

Q12. How do you troubleshoot Performance tuning

Ans.

Performance tuning troubleshooting involves identifying bottlenecks and optimizing system resources.

  • Identify the bottleneck by monitoring system resources such as CPU, memory, disk I/O, and network usage.

  • Analyze application and database performance metrics to identify slow queries or inefficient code.

  • Optimize system resources by adjusting configuration settings, upgrading hardware, or implementing caching mechanisms.

  • Test and validate performance improvements to ensure they ha...read more

Add your answer

Q13. 1. How do you perform parallel testing in selenium.

Ans.

Parallel testing in Selenium can be performed using Selenium Grid or cloud-based testing platforms.

  • Selenium Grid allows for parallel execution of tests on multiple machines or browsers simultaneously.

  • Cloud-based testing platforms like Sauce Labs or BrowserStack provide access to a large number of virtual machines for parallel testing.

  • Parallel testing can significantly reduce test execution time and improve test coverage.

  • Test scripts should be designed to be thread-safe and no...read more

Add your answer

Q14. ODI file wait - how does it work ?

Ans.

ODI file wait is a feature that allows ODI to wait for a file to be available before proceeding with the execution of a task.

  • ODI file wait is configured in the ODI topology manager

  • It can be used in scenarios where a file needs to be processed before continuing with the task

  • ODI file wait can be set to wait for a specific file name or a file pattern

  • It can also be configured to wait for a specific amount of time before timing out

  • Once the file is available, ODI will proceed with ...read more

Add your answer

Q15. 2. How do you manage automation testing in an agile project.

Ans.

Automation testing in agile project is managed by continuous integration, frequent testing, and collaboration.

  • Use continuous integration to ensure that automated tests are run frequently and consistently.

  • Collaborate with developers and testers to ensure that automated tests are integrated into the development process.

  • Use tools like Selenium, Appium, and JUnit to automate testing.

  • Ensure that automated tests are written in a way that is maintainable and scalable.

  • Use test-driven...read more

Add your answer

Q16. Technology on which worked and the work you perform daily basis

Ans.

I work with various technologies on a daily basis, including Java, Python, and SQL.

  • I have experience with Java programming and use it frequently for developing applications.

  • I also work with Python for data analysis and machine learning tasks.

  • SQL is another technology I use regularly for managing and querying databases.

  • I am familiar with various software development tools such as Git, JIRA, and Jenkins.

  • I stay up-to-date with the latest technologies and trends in the industry t...read more

Add your answer

Q17. How did you increase the revenues of the company in cyber security.

Ans.

I increased revenues in cyber security by implementing targeted marketing campaigns and offering customized solutions to clients.

  • Implemented targeted marketing campaigns to reach potential clients in need of cyber security services

  • Offered customized solutions to clients based on their specific needs and budget constraints

  • Expanded service offerings to include additional cyber security solutions such as penetration testing and incident response

  • Established partnerships with othe...read more

Add your answer

Q18. What have you done in OAF personalization and Forms personalization?

Ans.

I have experience in OAF personalization and Forms personalization.

  • In OAF personalization, I have customized the user interface by adding new fields, modifying existing fields, and creating custom pages.

  • In Forms personalization, I have created custom triggers, added validation rules, and modified the behavior of standard forms.

  • For example, in OAF personalization, I added a new field to the employee details page to capture additional information.

  • In Forms personalization, I cre...read more

View 1 answer

Q19. 3. Tell me difference between list and set and implementation in selenium.

Ans.

List and Set are data structures in Java. List allows duplicates while Set does not.

  • List is an ordered collection while Set is not.

  • List allows null values while Set does not.

  • In Selenium, we can use List to store a collection of web elements and Set to store a collection of unique strings.

  • Example: List names = new ArrayList<>(); Set numbers = new HashSet<>();

  • List has methods like add(), remove(), get() while Set has methods like add(), remove(), contains().

Add your answer

Q20. 6. How will you rerun failed tests in selenium?

Ans.

Failed tests in Selenium can be rerun using TestNG or JUnit frameworks.

  • Use TestNG or JUnit frameworks to rerun failed tests.

  • In TestNG, use the 'retryAnalyzer' attribute to specify the retry analyzer class.

  • In JUnit, use the '@RetryTest' annotation to specify the number of times to retry the test.

  • Configure the maximum number of retries and the delay between retries.

  • Use a test listener to log the results of the rerun.

Add your answer

Q21. What is the difference between CSS selector and XPath

Ans.

CSS selector is used to select HTML elements based on their id, class, attributes, etc. XPath is a language for navigating XML documents.

  • CSS selector is more commonly used for selecting elements in HTML documents.

  • XPath is more powerful and flexible, allowing for more complex selection of elements.

  • CSS selector is easier to read and write for simple selections.

  • XPath can traverse both upwards and downwards in the document tree.

  • CSS selector example: div.container > p

  • XPath example...read more

Add your answer

Q22. Difference between == and equals method in String comparision

Ans.

The == operator compares the reference of two String objects, while the equals() method compares their values.

  • The == operator checks if two String objects refer to the same memory location.

  • The equals() method checks if two String objects have the same sequence of characters.

  • Using == for String comparison can lead to unexpected results.

  • Example: String str1 = "hello"; String str2 = "hello"; str1 == str2 will return true because they refer to the same memory location, but str1.e...read more

View 1 answer

Q23. Can you provide more details about the Change Management process?

Ans.

Change Management process involves planning, implementing, and monitoring changes to ensure successful outcomes.

  • Change Management process includes identifying the need for change, assessing the impact, planning the change, implementing the change, and evaluating the results.

  • Communication is key in Change Management to ensure stakeholders are informed and involved throughout the process.

  • Resistance to change is common and should be addressed through effective communication and ...read more

Add your answer

Q24. 9. Tell me different response status codes of REST of APIs and their meaning.

Ans.

Response status codes of REST APIs and their meanings.

  • 200 OK - Successful request

  • 201 Created - New resource created

  • 400 Bad Request - Invalid request

  • 401 Unauthorized - Authentication failed

  • 403 Forbidden - Authorization failed

  • 404 Not Found - Resource not found

  • 500 Internal Server Error - Server error

Add your answer

Q25. Difference between always on and clustering

Ans.

Always On is a high availability feature in SQL Server that provides automatic failover, while clustering is a group of servers working together to provide high availability.

  • Always On is a feature in SQL Server that provides automatic failover and disaster recovery capabilities

  • Clustering is a group of servers working together to provide high availability and load balancing

  • Always On is specific to SQL Server, while clustering can be used in various technologies

  • Always On requir...read more

Add your answer

Q26. How to handle complex file in ODI ?

Ans.

Complex files in ODI can be handled by using various techniques.

  • Use ODI's built-in file handling capabilities

  • Use custom Java code to handle complex file formats

  • Use third-party tools like Apache Nifi or Talend to preprocess the files

  • Use ODI's knowledge modules to transform the data into a more manageable format

  • Use ODI's parallel processing capabilities to speed up the processing of large files

Add your answer

Q27. How to perform DR activity in case of backup servers down?

Ans.

Perform DR activity by activating the secondary backup servers.

  • Activate the secondary backup servers and restore data from the latest backup

  • Ensure that all necessary applications and services are running on the secondary servers

  • Test the restored data and applications to ensure they are functioning properly

  • Update DNS records and routing to direct traffic to the secondary servers

  • Monitor the secondary servers closely to ensure they are handling the load properly

Add your answer

Q28. What is the structure of a war file if you unzip it.?

Ans.

A war file is a compressed file format used to package Java web applications.

  • A war file contains web application components such as servlets, JSPs, HTML pages, and other resources.

  • The file structure includes a WEB-INF directory containing web.xml deployment descriptor, lib directory containing JAR files, and classes directory containing compiled Java classes.

  • The war file can be unzipped using any standard zip utility.

  • Example: sample.war file unzipped will have a directory str...read more

Add your answer

Q29. What is the difference between cache and persist in Spark?

Ans.

Cache and persist are both used for optimizing Spark performance by storing intermediate results in memory, but persist allows for more customization.

  • Cache() is a shorthand for persist(StorageLevel.MEMORY_ONLY)

  • Persist() allows for specifying different storage levels such as MEMORY_ONLY, MEMORY_AND_DISK, etc.

  • Persist() also allows for specifying serialization formats like Java, Kryo, etc.

Add your answer

Q30. Write a selenium java code to identify broken links on a web page

Ans.

Use Selenium Java code to identify broken links on a web page

  • Create a WebDriver instance using Selenium

  • Find all the links on the web page using findElements method

  • Iterate through each link and check for response code using HttpURLConnection class

  • Identify links with response code other than 200 as broken links

Add your answer

Q31. What are the different types and their process?

Ans.

There are different types of consultants such as management, IT, financial, and HR consultants, each with their own unique processes.

  • Management consultants help organizations improve their performance through analysis and strategy implementation.

  • IT consultants provide technology solutions and support to businesses.

  • Financial consultants offer advice on financial planning, investments, and risk management.

  • HR consultants assist with human resource management, including recruitme...read more

Add your answer

Q32. What are the methods for Requirements Gathering?

Ans.

Methods for gathering requirements include interviews, surveys, observation, and prototyping.

  • Interviews with stakeholders to understand their needs and expectations

  • Surveys to gather feedback from a larger group of people

  • Observation of current processes and workflows

  • Prototyping to test and refine ideas

  • Brainstorming sessions to generate new ideas

  • Focus groups to gather feedback from a specific target audience

  • Document analysis to review existing documentation

  • JAD sessions to bring...read more

Add your answer

Q33. Why do you choose TCS

Ans.

I chose TCS because of its global presence, diverse opportunities, and strong reputation in the industry.

  • TCS has a strong global presence with offices in over 46 countries, providing opportunities to work on international projects and collaborate with diverse teams.

  • TCS offers a wide range of career opportunities across various industries, allowing me to explore different domains and develop a versatile skillset.

  • TCS has a strong reputation in the IT industry, known for its inn...read more

View 4 more answers

Q34. How do you fine tune the query

Ans.

To fine tune a query, optimize the database, use indexes, limit the result set, and use appropriate joins.

  • Optimize the database by removing unnecessary data and improving data structure

  • Use indexes to speed up data retrieval

  • Limit the result set by using WHERE clause and pagination

  • Use appropriate joins to minimize the number of rows returned

  • Consider using caching to reduce database load

Add your answer

Q35. How we handle different situations during project life cycle

Ans.

We handle different situations during project life cycle by identifying the issue, analyzing it, and implementing a solution.

  • Identify the issue or problem

  • Analyze the situation and gather information

  • Develop a plan of action

  • Implement the solution

  • Monitor and evaluate the results

  • Adjust the plan as necessary

Add your answer

Q36. Tell me about your automation test framwork

Ans.

My automation test framework is built using Selenium WebDriver and TestNG for web applications.

  • Utilizes Selenium WebDriver for interacting with web elements

  • Uses TestNG for test case management and reporting

  • Includes page object model design pattern for better code organization

  • Integration with CI/CD tools like Jenkins for automated test execution

Add your answer

Q37. Why String is Immutable. Explain with code.

Ans.

String is immutable in Java to ensure security, thread safety, and optimization.

  • String objects are stored in the String pool, which helps in memory optimization.

  • Immutable strings are thread-safe, as their values cannot be changed once created.

  • String immutability prevents malicious code from modifying sensitive data.

  • Example: String str = "Hello"; str.concat(" World"); // This does not change the original string value.

Add your answer

Q38. What are the RICE objects you have worked on.

Ans.

I have worked on RICE objects for various modules including FI, MM, and SD.

  • Developed custom reports using ALV and Smart Forms for FI module

  • Created custom transactions for MM module using BDC and BAPI

  • Enhanced standard SD transactions using user exits and BADI

  • Implemented custom workflows using SAP Workflow for various modules

  • Developed custom interfaces using IDOCs and RFCs

View 1 answer

Q39. Write code for setters and getters methods

Ans.

Code for setters and getters methods

  • For each instance variable, create a setter and getter method

  • Setters should take in a parameter and assign it to the instance variable

  • Getters should return the value of the instance variable

  • Naming convention for setters and getters should follow camelCase

View 1 answer

Q40. What are the different types of network topology?

Ans.

Different types of network topology include bus, star, ring, mesh, and hybrid.

  • Bus Topology: All devices are connected to a central cable, like a bus route.

  • Star Topology: All devices are connected to a central hub.

  • Ring Topology: Each device is connected to two other devices, forming a ring.

  • Mesh Topology: Every device is connected to every other device.

  • Hybrid Topology: Combination of two or more different types of topologies.

Add your answer

Q41. Where string memories are allocated

Ans.

String memories are allocated in different places depending on the programming language and platform.

  • In C, string memories are allocated on the stack or heap depending on how they are declared.

  • In Java, string memories are allocated on the heap.

  • In Python, string memories are allocated on the heap and are managed by the interpreter.

  • In JavaScript, string memories are allocated on the heap and are managed by the garbage collector.

Add your answer

Q42. How load large file in ODI ?

Ans.

Large files can be loaded in ODI using various techniques such as partitioning, chunking, and parallel processing.

  • Use partitioning to divide the large file into smaller chunks and load them in parallel

  • Chunking involves breaking the large file into smaller pieces and loading them sequentially

  • Parallel processing can be used to load multiple chunks of the file simultaneously

  • ODI also supports external tables, which can be used to load data from large files stored outside the data...read more

Add your answer

Q43. What are the inspection types in SAP QM?

Ans.

Inspection types in SAP QM include goods receipt inspection, goods issue inspection, and in-process inspection.

  • Goods receipt inspection is used to inspect materials received from vendors

  • Goods issue inspection is used to inspect materials before they are issued to production

  • In-process inspection is used to inspect materials during the production process

Add your answer

Q44. Explain rank dense rank and ntile function with example

Ans.

Rank, dense rank, and ntile functions are used in SQL to assign a ranking to rows based on a specified criteria.

  • Rank function assigns a unique rank to each row based on the specified criteria.

  • Dense rank function assigns a unique rank to each row, but does not leave gaps in the ranking sequence.

  • Ntile function divides the result set into a specified number of groups and assigns a group number to each row.

  • Example: SELECT name, salary, RANK() OVER (ORDER BY salary DESC) AS rank F...read more

Add your answer

Q45. How does consistent JKM works ?

Ans.

Consistent JKM ensures uniformity in the execution of tasks and processes.

  • JKM stands for Job Knowledge Management

  • Consistent JKM involves documenting and sharing best practices

  • It helps in reducing errors and improving efficiency

  • For example, a consistent JKM approach in software development would involve using the same coding standards and tools across the team

Add your answer

Q46. Performance issues in production environments and fix?

Ans.

Performance issues in production environments are common and can be fixed by identifying the root cause, optimizing code, tuning database queries, and monitoring system resources.

  • Identify the root cause of the performance issue by analyzing logs, monitoring tools, and user reports.

  • Optimize code by removing unnecessary loops, improving algorithms, and reducing database calls.

  • Tune database queries by adding indexes, optimizing joins, and caching query results.

  • Monitor system res...read more

Add your answer

Q47. How do we take screenshot in Selenium

Ans.

Screenshots in Selenium can be taken using the getScreenshotAs method of the WebDriver interface.

  • Use the getScreenshotAs method of the WebDriver interface to capture the screenshot.

  • Save the screenshot as a file using the FileUtils class.

  • Handle exceptions like IOException when saving the screenshot.

Add your answer

Q48. How will you automation drop down

Ans.

To automate a drop down, you can use tools like Selenium WebDriver to interact with the drop down element and select options programmatically.

  • Use Selenium WebDriver to locate the drop down element on the webpage

  • Identify the options within the drop down using findElements method

  • Use select class in Selenium to interact with the drop down and select desired option

Add your answer

Q49. Different methods available in Alert class

Ans.

The Alert class in Java provides different methods to display alerts or messages to the user.

  • The showMessageDialog() method displays a message dialog with an OK button.

  • The showConfirmDialog() method displays a confirmation dialog with Yes/No buttons.

  • The showOptionDialog() method displays a customized dialog with options to choose from.

  • The showInputDialog() method displays an input dialog to get input from the user.

  • The showErrorDialog() method displays an error dialog with an ...read more

Add your answer

Q50. How do you prioritize the Requirements?

Ans.

Requirements are prioritized based on their importance and impact on project goals.

  • Identify critical requirements that are necessary for project success

  • Consider the impact of each requirement on project timelines and budget

  • Involve stakeholders in the prioritization process

  • Use a scoring system to rank requirements based on their importance

  • Revisit and adjust priorities as needed throughout the project

Add your answer

Q51. Difference between static look up and dynamic look up

Ans.

Static look up is done at compile time while dynamic look up is done at runtime.

  • Static look up is determined at compile time based on the code structure.

  • Dynamic look up is determined at runtime based on the actual data or conditions.

  • Example: Static look up in a switch statement with fixed cases, dynamic look up in a database query with changing parameters.

Add your answer

Q52. Difference btw M365 and office 365 basic understanding of technology

Ans.

M365 and Office 365 are both productivity suites, but M365 includes additional features like Windows 10 and Enterprise Mobility + Security.

  • M365 includes Office 365, Windows 10, and Enterprise Mobility + Security.

  • Office 365 is focused on cloud-based productivity tools like Word, Excel, and PowerPoint.

  • M365 offers advanced security and device management capabilities.

  • Office 365 plans are available for personal, business, and enterprise use.

  • M365 is designed for businesses and incl...read more

Add your answer

Q53. How do you create a custom annotations?

Ans.

Custom annotations can be created using the @interface keyword in Java.

  • Create a new interface with the @interface keyword

  • Define the annotation's properties using methods

  • Add default values for the properties

  • Add the @Retention and @Target annotations to specify how the annotation can be used

  • Example: @interface MyAnnotation { String value() default ""; }

  • Example usage: @MyAnnotation(value="example")

Add your answer

Q54. What is dynamic modification rule?

Ans.

Dynamic modification rule is a rule that allows changes to be made to a system or process in real-time based on certain conditions.

  • Dynamic modification rules are used in various industries to automate processes and improve efficiency.

  • These rules can be programmed to trigger specific actions based on predefined criteria.

  • For example, in e-commerce, a dynamic modification rule can adjust pricing based on demand or competitor prices.

  • In healthcare, dynamic modification rules can b...read more

Add your answer

Q55. Mail flow in hybrid deployment.

Ans.

Mail flow in hybrid deployment

  • In hybrid deployment, mail flow can be routed through on-premises Exchange servers or Exchange Online

  • Mail can be sent between on-premises and cloud mailboxes using connectors

  • Exchange Online Protection (EOP) can be used for inbound and outbound mail filtering

  • Transport Layer Security (TLS) can be used to secure mail flow between on-premises and cloud

  • Mail can be redirected to on-premises servers for compliance or archiving purposes

Add your answer

Q56. Pivot command in SQL ? Running total ?

Ans.

Pivot command in SQL is used to transform rows into columns. Running total is a cumulative sum of values.

  • Pivot command is used to aggregate data and display it in a more readable format

  • Running total is calculated by adding the current value to the previous total

  • Example of pivot command: SELECT * FROM table_name PIVOT (SUM(column_name) FOR pivot_column IN (value1, value2, value3))

  • Example of running total: SELECT column_name, SUM(column_name) OVER (ORDER BY column_name) AS runn...read more

Add your answer

Q57. Project handling major issues found and fix?

Ans.

Handling major project issues involves identifying, prioritizing, and resolving them efficiently to ensure project success.

  • Identify major issues through regular project monitoring and communication with team members and stakeholders

  • Prioritize issues based on impact on project timeline, budget, and overall success

  • Develop a plan to address each major issue, involving relevant team members and stakeholders

  • Implement solutions in a timely manner to minimize project delays and risk...read more

Add your answer

Q58. Explain the basic pillars of Cyber Security

Ans.

The basic pillars of Cyber Security include confidentiality, integrity, availability, and non-repudiation.

  • Confidentiality: Ensuring that data is only accessible to authorized individuals or systems.

  • Integrity: Ensuring that data is accurate and has not been tampered with.

  • Availability: Ensuring that data and systems are accessible when needed.

  • Non-repudiation: Ensuring that a sender cannot deny sending a message and a recipient cannot deny receiving it.

Add your answer

Q59. How does garbage collection work in Java

Ans.

Garbage collection in Java automatically manages memory by reclaiming unused objects.

  • Garbage collection runs in the background to identify and remove objects that are no longer needed.

  • It helps prevent memory leaks and optimize memory usage.

  • Java uses different garbage collection algorithms like Serial, Parallel, CMS, and G1.

  • Example: System.gc() can be used to suggest garbage collection, but it's not guaranteed to run immediately.

Add your answer

Q60. Connectors in Office 365

Ans.

Connectors in Office 365 allow users to integrate third-party apps and services with their Office 365 accounts.

  • Connectors can be used to receive notifications and updates from external sources directly in Office 365.

  • Examples of connectors include Twitter, Trello, and GitHub.

  • Connectors can be added to individual channels in Microsoft Teams.

  • Users can also create custom connectors using Microsoft Power Automate.

  • Connectors can improve productivity and streamline workflows by brin...read more

View 1 answer

Q61. What is SQL explain in detail

Ans.

SQL is a programming language used for managing and manipulating relational databases.

  • SQL stands for Structured Query Language.

  • It is used to communicate with databases to perform tasks such as querying data, updating data, and creating databases.

  • SQL statements are used to perform tasks like selecting data from a database table, inserting new records, updating existing records, and deleting records.

  • Examples of SQL commands include SELECT, INSERT, UPDATE, DELETE, CREATE, and DR...read more

Add your answer

Q62. What is Zero Threat vulnerability

Ans.

Zero Threat vulnerability refers to a security flaw that poses no immediate risk or harm to a system.

  • Zero Threat vulnerabilities are typically low severity issues that do not have the potential to be exploited by attackers.

  • These vulnerabilities may still need to be addressed to maintain a secure system, but they are not urgent.

  • Examples of Zero Threat vulnerabilities include unused ports left open on a firewall or outdated software that is not actively being targeted by attack...read more

Add your answer

Q63. 4xx status codes in API testing

Ans.

4xx status codes indicate client errors in API testing.

  • 4xx status codes are returned by the server when the client has made an error in the request.

  • Some common 4xx status codes include 400 Bad Request, 401 Unauthorized, 403 Forbidden, and 404 Not Found.

  • API testers should verify that the correct 4xx status code is returned for each type of client error.

  • Proper handling of 4xx status codes can improve the user experience and prevent security vulnerabilities.

Add your answer

Q64. Advanced level of functional testing lead

Ans.

An advanced level functional testing lead is responsible for overseeing and executing complex functional testing processes.

  • Experience in leading and coordinating functional testing efforts

  • Ability to create detailed test plans and test cases

  • Strong understanding of testing methodologies and tools

  • Excellent communication and problem-solving skills

  • Experience with automation testing tools like Selenium or JUnit

Add your answer

Q65. Difference between Interface and abstract class

Ans.

An abstract class can have both abstract and non-abstract methods, while an interface can only have abstract methods.

  • An abstract class can have constructors, while an interface cannot.

  • A class can implement multiple interfaces, but can only inherit from one abstract class.

  • An abstract class can have instance variables, while an interface cannot.

  • An abstract class can provide default implementations for some methods, while an interface cannot.

  • An abstract class is used when a comm...read more

Add your answer

Q66. Test case execution order in TestNG

Ans.

TestNG allows test case execution order to be specified using priority attribute or by using dependsOnMethods attribute.

  • TestNG executes test cases in the order specified by priority attribute.

  • If priority attribute is not specified, TestNG executes test cases in alphabetical order of method names.

  • TestNG also allows test case execution order to be specified using dependsOnMethods attribute.

  • dependsOnMethods attribute specifies the methods that a test method depends on and TestNG...read more

Add your answer

Q67. 10. Explain your automation framework.

Ans.

Our automation framework is a hybrid framework that combines data-driven and keyword-driven approaches.

  • We use Excel sheets to store test data and test cases.

  • We have a centralized repository for reusable functions and libraries.

  • We use Selenium WebDriver for web automation and Appium for mobile automation.

  • We have a reporting mechanism that generates reports in HTML format.

  • We have integrated our framework with Jenkins for continuous integration.

  • We follow the Page Object Model de...read more

Add your answer

Q68. What is Informatica architecture

Ans.

Informatica architecture refers to the structure and components of the Informatica platform for data integration and management.

  • Informatica architecture consists of various components such as PowerCenter, PowerExchange, and Data Quality.

  • PowerCenter is the core component responsible for ETL (Extract, Transform, Load) processes.

  • PowerExchange enables connectivity to various data sources and targets.

  • Data Quality ensures data accuracy and consistency.

  • Informatica architecture allow...read more

Add your answer

Q69. What is TestNG profiling

Ans.

TestNG profiling is a feature that allows developers to analyze the performance of their test cases and identify bottlenecks.

  • TestNG profiling helps in identifying slow-running test cases and optimizing them for better performance.

  • It provides detailed information on the execution time of each test method, helping developers prioritize optimization efforts.

  • Profiling can be done at the method level, class level, or suite level in TestNG.

  • Developers can use profiling data to impro...read more

Add your answer

Q70. How to create deduplication policies ?

Ans.

Deduplication policies can be created by identifying duplicate data and defining rules to handle them.

  • Identify duplicate data using tools like hashing or comparison algorithms

  • Define rules for handling duplicates such as keeping the first or last occurrence, or merging them

  • Consider factors like data type, size, and frequency of occurrence when creating policies

  • Regularly review and update policies to ensure they are effective

Add your answer

Q71. What is the parameterized jobs

Ans.

Parameterized jobs allow users to pass parameters to a job when it is executed.

  • Parameters can be used to customize the behavior of a job

  • Parameters can be defined in the job configuration

  • Parameters can be passed through the Jenkins API or command line

  • Examples include passing a build number or target environment as a parameter

Add your answer

Q72. What is structured array list

Ans.

A structured array list is a data structure that stores elements of the same data type in contiguous memory locations.

  • Elements are accessed using an index.

  • Insertion and deletion operations can be expensive as all elements after the insertion/deletion point need to be shifted.

  • Examples include ArrayList in Java and List in C#.

Add your answer

Q73. AAD connect configuration.

Ans.

AAD connect configuration is used to synchronize on-premises directories with Azure AD.

  • AAD Connect is used to sync user accounts, passwords, and groups from on-premises AD to Azure AD

  • It can be configured to filter which objects are synced

  • It supports multiple forest and domain configurations

  • It can be set up for password writeback and seamless single sign-on

  • It requires a service account with appropriate permissions in on-premises AD

  • It can be monitored and managed through the Az...read more

Add your answer

Q74. What are Java 8 features?

Ans.

Java 8 introduced several new features including lambda expressions, streams, functional interfaces, and default methods.

  • Lambda expressions allow you to write code in a more concise and readable way.

  • Streams provide a way to work with sequences of elements and perform operations on them.

  • Functional interfaces are interfaces with a single abstract method, which can be implemented using lambda expressions.

  • Default methods allow interfaces to have method implementations.

  • Other featu...read more

Add your answer

Q75. Difference between different select query

Ans.

Different select queries have different purposes and syntax.

  • SELECT retrieves data from one or more tables

  • DISTINCT removes duplicates from the result set

  • WHERE filters the result set based on a condition

  • GROUP BY groups the result set by one or more columns

  • HAVING filters the result set based on a condition after grouping

  • ORDER BY sorts the result set by one or more columns

  • LIMIT limits the number of rows returned

  • JOIN combines rows from two or more tables based on a related column

Add your answer

Q76. Challenge faced in developing any code

Ans.

One challenge in developing code is handling complex logic and ensuring its correctness.

  • Understanding and implementing complex requirements

  • Managing dependencies and integrating different components

  • Testing and debugging to ensure correctness

  • Optimizing code for performance

  • Maintaining code readability and scalability

Add your answer

Q77. Explain what is abstraction

Ans.

Abstraction is the process of hiding complex implementation details and exposing only the necessary information.

  • Abstraction is used to simplify complex systems by breaking them down into smaller, more manageable parts.

  • It allows us to focus on the essential features of a system while ignoring the non-essential details.

  • Abstraction can be achieved through the use of abstract classes, interfaces, and encapsulation.

  • For example, a car can be abstracted as a machine that has an engi...read more

Add your answer

Q78. What is multipathing.

Ans.

Multipathing is a technique used to provide redundancy and load balancing in storage networks.

  • Multipathing allows for multiple paths between a server and storage device to be used simultaneously.

  • It provides redundancy in case of a path failure and load balancing to optimize performance.

  • Multipathing is commonly used in Fibre Channel and iSCSI storage networks.

  • Examples of multipathing software include MPIO for Windows and PowerPath for EMC storage systems.

Add your answer

Q79. How to reduce LVM partition

Ans.

To reduce LVM partition, we need to shrink the file system first and then reduce the size of the logical volume.

  • Shrink the file system using appropriate tools like resize2fs for ext2/3/4 file systems or xfs_growfs for XFS file systems

  • Reduce the size of the logical volume using lvreduce command

  • Make sure to take a backup of important data before performing any partition resizing operations

Add your answer

Q80. Program on String reverse and Anagram

Ans.

Program to reverse strings and check for anagrams in an array of strings.

  • Create a function to reverse a string by iterating through each character and appending to a new string.

  • Check if two strings are anagrams by sorting the characters in each string and comparing them.

  • Iterate through the array of strings and apply the above functions to reverse and check for anagrams.

Add your answer

Q81. Project execution methodology

Ans.

Project execution methodology refers to the process of planning, organizing, and managing resources to achieve project goals.

  • It involves defining project scope, objectives, and deliverables

  • Selecting the appropriate project management approach

  • Developing a project plan and schedule

  • Assigning tasks and responsibilities to team members

  • Monitoring project progress and making necessary adjustments

  • Examples of project execution methodologies include Agile, Waterfall, and Hybrid

Add your answer

Q82. Disadvantages of Microservice architecture

Ans.

Microservice architecture has some disadvantages.

  • Increased complexity in deployment and management

  • Increased network latency and communication overhead

  • Difficulties in maintaining data consistency across services

  • Requires significant investment in infrastructure and tooling

  • May not be suitable for small or simple applications

Add your answer

Q83. Check constrain in SQL

Ans.

Check constraint is used to limit the values that can be inserted into a column.

  • It is a type of constraint in SQL

  • It is used to limit the values that can be inserted into a column

  • It is used to ensure data integrity

  • It can be used to check for a range of values, data types, or conditions

  • Example: CREATE TABLE Students (id INT, name VARCHAR(50), age INT CHECK (age >= 18));

Add your answer

Q84. What is a servlet actually?

Ans.

A servlet is a Java program that runs on a web server and handles client requests.

  • Servlets are used to create dynamic web pages and web applications.

  • They can handle HTTP requests and responses.

  • Servlets can be used to process form data, authenticate users, and more.

  • Examples of servlet containers include Apache Tomcat and Jetty.

Add your answer

Q85. Area of interest

Ans.

My area of interest is data analysis and visualization.

  • I have experience using tools like Tableau and Power BI for data visualization.

  • I enjoy exploring trends and patterns in data to derive insights.

  • I have worked on projects involving data cleaning, analysis, and presentation.

Add your answer

Q86. Collection in PL SQL

Ans.

Collection in PL SQL is a data structure that can hold multiple values of the same data type.

  • Collections can be nested within each other.

  • PL/SQL provides three types of collections: associative arrays, nested tables, and VARRAYs.

  • Collections can be used to pass multiple values to a stored procedure or function.

  • Collections can be used to simplify SQL statements by allowing multiple rows to be returned as a single result set.

Add your answer

Q87. Write code for Explicit wait

Ans.

Code for Explicit wait in Selenium WebDriver

  • Import WebDriverWait and ExpectedConditions classes

  • Specify the maximum time to wait and the polling interval

  • Use ExpectedConditions methods like elementToBeClickable, visibilityOfElementLocated, etc.

  • Apply the wait to a specific element or condition

Add your answer

Q88. What is owin.

Ans.

OWIN stands for Open Web Interface for .NET. It is a standard interface between .NET web servers and web applications.

  • OWIN decouples the web application from the web server, making it easier to develop and test.

  • It allows developers to write middleware components that can be used across different web frameworks.

  • OWIN is used in ASP.NET applications to provide a standard interface for communication between the web server and the application.

  • Examples of OWIN-compatible web server...read more

Add your answer

Q89. Explain Report Bursting.

Ans.

Report bursting is a process of delivering personalized reports to multiple recipients based on predefined criteria.

  • Report bursting is used to distribute a single report to multiple recipients.

  • It allows for the customization of report content based on recipient-specific data or preferences.

  • Criteria for report bursting can include recipient roles, departments, locations, or any other relevant attributes.

  • Reports can be bursted in various formats such as PDF, Excel, or HTML.

  • Exam...read more

View 1 answer

Q90. Explain joins using excel

Ans.

Joins in Excel are used to combine data from different tables based on a common column.

  • Joins in Excel are performed using the VLOOKUP, INDEX/MATCH, or Power Query functions.

  • Common types of joins include inner join, left join, right join, and full outer join.

  • Joins help in merging data from multiple tables to create a single, unified dataset.

  • For example, you can use VLOOKUP to combine sales data from one table with customer information from another table.

Add your answer

Q91. Kafka pipeline with database

Ans.

Using Kafka to create a pipeline with a database for real-time data processing.

  • Set up Kafka Connect to stream data from database to Kafka topics

  • Use Kafka Streams to process and analyze data in real-time

  • Integrate with database connectors like JDBC or Debezium

  • Ensure data consistency and fault tolerance in the pipeline

Add your answer

Q92. Explain framework worked

Ans.

A framework is a structured set of guidelines or rules that provide a foundation for developing software applications.

  • Frameworks provide a structure for developers to build upon, saving time and effort.

  • They often include pre-written code, libraries, and tools to streamline development.

  • Frameworks can be specific to a certain programming language or technology, such as Angular for JavaScript or Django for Python.

Add your answer

Q93. Explain plan

Ans.

Explain plan is a feature in Oracle database that shows the execution plan of a SQL statement.

  • It helps in identifying the most efficient way to execute a query.

  • It shows the order in which tables are accessed, join methods used, and access methods used.

  • It can be generated using the EXPLAIN PLAN statement or through tools like SQL Developer.

  • The output can be in either text or graphical format.

Add your answer

Q94. New features of dynamics 365

Ans.

Dynamics 365 has new features for better customer engagement, AI-driven insights, and improved productivity.

  • Improved integration with LinkedIn Sales Navigator for better lead generation

  • AI-driven insights for sales and customer service

  • Improved productivity with new mobile app features

  • New Dynamics 365 Virtual Agent for Customer Service

  • Enhanced Dynamics 365 Marketing capabilities

  • Improved Dynamics 365 Finance and Operations with new features for supply chain management and projec...read more

Add your answer

Q95. Xpath how to find

Ans.

Xpath is a query language used to navigate through XML documents and locate elements based on their attributes or values.

  • Use double forward slashes (//) to select all elements in the document

  • Use square brackets to specify conditions for selecting elements, such as [@attribute='value']

  • Use the 'text()' function to select elements based on their text content

  • Use the 'contains()' function to select elements that contain a specific value

Add your answer

Q96. Using sink connectors

Ans.

Sink connectors are used to connect a sink to the plumbing system, allowing for drainage of water and waste.

  • Sink connectors come in various sizes and materials to fit different sink and plumbing configurations.

  • They are typically made of PVC, stainless steel, or brass.

  • Proper installation of sink connectors is important to prevent leaks and ensure proper drainage.

  • Examples of sink connectors include P-traps, tailpieces, and extension tubes.

Add your answer

Q97. Why you choose TCS

Ans.

I chose TCS for its global presence, diverse opportunities, and strong reputation in the industry.

  • Global presence with offices in multiple countries

  • Diverse opportunities for career growth and development

  • Strong reputation in the industry for quality services and innovation

Add your answer

Q98. Explain OOPS Principles

Ans.

OOPS principles are a set of guidelines that help in designing and implementing object-oriented programs.

  • Abstraction: Hiding implementation details and showing only necessary information.

  • Encapsulation: Binding data and functions that manipulate it, into a single unit.

  • Inheritance: Creating new classes from existing ones, inheriting properties and methods.

  • Polymorphism: Ability of objects to take on multiple forms, depending on the context.

  • Examples: Animal class can have subclas...read more

Add your answer

Q99. Fibonacci series in C

Ans.

Fibonacci series in C is a sequence of numbers where each number is the sum of the two preceding ones.

  • Declare an array to store the Fibonacci series

  • Initialize the first two elements of the array as 0 and 1

  • Use a loop to calculate and store the next elements by adding the previous two elements

Add your answer

Q100. Palindrome series in C

Ans.

A palindrome series in C is a series of strings that read the same forwards and backwards.

  • Create an array of strings to store the series

  • Use a loop to iterate through the series and check if each string is a palindrome

  • Print or store the palindromic strings

Add your answer
1
2
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter