Add office photos
Engaged Employer

TCS

3.7
based on 84k Reviews
Filter interviews by

60+ Interview Questions and Answers

Updated 10 Dec 2024
Popular Designations

Q1. How do you create alert mechanism with using any 3rd party tools ?

Ans.

To create an alert mechanism without using 3rd party tools, one can use scripting languages like Python or Bash.

  • Use scripting languages like Python or Bash to create custom alert mechanisms

  • Leverage built-in system tools like cron jobs and email notifications

  • Integrate with existing monitoring systems like Nagios or Zabbix

  • Create custom scripts to monitor specific events or metrics

  • Use APIs to integrate with external services like Slack or PagerDuty

Add your answer

Q2. Difference between canvas apps and model driven apps. Where to use what?

Ans.

Canvas apps are highly customizable and allow for more creative freedom, while model driven apps are more structured and data-driven.

  • Canvas apps are ideal for scenarios where you need to create a custom user interface or experience

  • Model driven apps are better suited for scenarios where you need to manage complex data models and business processes

  • Canvas apps are built using a drag-and-drop interface, while model driven apps are built using the Power Apps framework

  • Examples of c...read more

Add your answer

Q3. 1) Role of the Scrum Master 2) Scrum Events 3) Vertical slicing. 4) Product Owner Role and importance 5) How will you run a sprint if a user story has to be added in the middle of the sprint ?

Ans.

The role of the Scrum Master, Scrum events, vertical slicing, Product Owner role, and handling user story additions mid-sprint.

  • The Scrum Master is responsible for facilitating the Scrum process, ensuring the team follows Scrum principles, and removing any obstacles that may impede progress.

  • Scrum events include Sprint Planning, Daily Stand-ups, Sprint Review, and Sprint Retrospective.

  • Vertical slicing refers to breaking down user stories into smaller, valuable increments that c...read more

Add your answer

Q4. How to submit one form details to multiple SharePoint list

Ans.

To submit one form details to multiple SharePoint list, use Microsoft Power Automate.

  • Create a new flow in Power Automate

  • Add the trigger 'When an item is created or modified'

  • Add the action 'Create item' for each SharePoint list

  • Map the fields from the form to the corresponding SharePoint list columns

  • Save and test the flow

View 1 answer
Discover null interview dos and don'ts from real experiences

Q5. What are the measures you need to do to prevent data lose?

Ans.

To prevent data loss, measures such as regular backups, data encryption, access control, and disaster recovery plans should be implemented.

  • Regularly backup data to an offsite location

  • Encrypt sensitive data to prevent unauthorized access

  • Implement access control measures to limit who can access and modify data

  • Create and test disaster recovery plans to ensure data can be recovered in case of a disaster

  • Train employees on data security best practices

Add your answer

Q6. What is middleware and give examples how it processs in .net core ?

Ans.

Middleware in .NET Core is software that acts as a bridge between an application's request and response.

  • Middleware in .NET Core is a pipeline of components that can process HTTP requests and responses.

  • Examples of middleware in .NET Core include authentication middleware, logging middleware, and error handling middleware.

  • Middleware components are added to the application's request pipeline in the Startup class using the UseMiddleware method.

Add your answer
Are these interview questions helpful?

Q7. What are different SQL codes we get when executing a COBOL DB2 program

Ans.

Different SQL codes in COBOL DB2 programs indicate various outcomes of SQL operations.

  • SQLCODE 0 indicates successful execution of SQL statement

  • SQLCODE -805 indicates DBRM or package not found in plan

  • SQLCODE -818 indicates timestamp mismatch between DB2 and application

  • SQLCODE -911 indicates deadlock or timeout

  • SQLCODE -501 indicates cursor not open

Add your answer

Q8. What is the difference between Promises and Observables

Ans.

Promises and Observables are both used for asynchronous programming, but Observables are more powerful and flexible.

  • Promises represent a single value that will be resolved or rejected at some point in the future.

  • Observables represent a stream of values that can be emitted over time.

  • Observables can be cancelled, while Promises cannot.

  • Observables can handle multiple values, errors, and completion events, while Promises can only handle a single value and error.

  • Observables can be...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. How to store image file in Power Automate

Ans.

To store image file in Power Automate, use OneDrive or SharePoint connector.

  • Use 'Create file' action from OneDrive or SharePoint connector

  • Set the 'File name' and 'File content' fields

  • Use dynamic content to get the image file from the previous action

  • Ensure the file format is supported by Power Automate

Add your answer

Q10. dict={9:[1,2,7]} find the numbers from the value which can make the same equal to key

Ans.

Find numbers from a list that can make the same equal to a given key.

  • Iterate through the list and check if the sum of any two numbers equals the key.

  • Return those two numbers.

  • Example: key=9, list=[1,2,7], answer=[2,7]

View 1 answer

Q11. What are the difference between NGFW and non-NGFW?

Ans.

NGFW is an advanced firewall that provides additional security features compared to non-NGFW.

  • NGFW has application awareness and can identify and control specific applications and protocols.

  • NGFW can perform deep packet inspection to detect and block advanced threats.

  • NGFW can provide SSL/TLS decryption and inspection to detect and block threats hidden in encrypted traffic.

  • Non-NGFW only provides basic packet filtering and port blocking.

  • Examples of NGFW include Cisco Firepower, P...read more

Add your answer

Q12. How is earned value analysis help with project planning

Ans.

Earned value analysis helps in project planning by providing a method to measure project performance and forecast future outcomes.

  • Helps in measuring project performance by comparing planned value, earned value, and actual cost

  • Provides a clear picture of project progress and helps in identifying potential issues early on

  • Allows for forecasting future project outcomes based on current performance data

  • Enables project managers to make informed decisions and adjustments to ensure p...read more

Add your answer

Q13. What is react. Some characterstics of react

Ans.

React is a JavaScript library for building user interfaces.

  • React is used for creating reusable UI components.

  • It follows a component-based architecture.

  • React uses a virtual DOM for efficient rendering.

  • It supports server-side rendering.

  • React is declarative, making it easier to understand and debug code.

  • It has a large and active community with extensive documentation and support.

Add your answer

Q14. What are the difference between IPS & IDS?

Ans.

IPS & IDS are both network security systems, but IPS is proactive while IDS is reactive.

  • IPS stands for Intrusion Prevention System and actively blocks malicious traffic.

  • IDS stands for Intrusion Detection System and only alerts when malicious traffic is detected.

  • IPS is placed inline with network traffic while IDS is placed passively to monitor traffic.

  • IPS can prevent attacks before they happen while IDS can only detect attacks after they happen.

  • Examples of IPS include Cisco Fi...read more

Add your answer

Q15. Sample AWS architecture for IoT solution

Ans.

AWS IoT solution architecture includes IoT devices, AWS IoT Core, AWS Lambda, and AWS S3.

  • IoT devices send data to AWS IoT Core

  • AWS IoT Core processes and routes data to AWS services

  • AWS Lambda functions process data in real-time

  • Data is stored in AWS S3 for further analysis

  • AWS IoT Analytics can be used for advanced analytics

View 1 answer

Q16. Write a trigger related to account contact relationship.

Ans.

A trigger related to account contact relationship

  • Create a trigger on the Account object

  • Use the 'after insert' and 'after update' events to capture changes

  • Query the related Contact records based on the Account Id

  • Perform necessary actions based on the relationship between Account and Contact

Add your answer

Q17. 1. What are the selenium exceptions you’ve faced

Ans.

I have faced exceptions like ElementNotVisibleException, NoSuchElementException, TimeoutException, StaleElementReferenceException, etc.

  • ElementNotVisibleException occurs when an element is present in the DOM but not visible on the page

  • NoSuchElementException is thrown when an element could not be found in the DOM

  • TimeoutException occurs when a command does not complete in the specified time

  • StaleElementReferenceException is thrown when the element is no longer attached to the DOM

Add your answer

Q18. How to estimate time for angular migration

Ans.

Estimating time for Angular migration involves assessing project scope, complexity, resources, and potential roadblocks.

  • Analyze the size and complexity of the existing AngularJS application

  • Identify dependencies on third-party libraries or services that may impact migration

  • Consider the availability of skilled developers for the migration process

  • Factor in potential roadblocks such as legacy code, lack of documentation, or outdated dependencies

  • Break down the migration process in...read more

Add your answer

Q19. Difference between different data structures in python

Ans.

Different data structures in Python include lists, tuples, sets, and dictionaries.

  • Lists: Ordered, mutable, allows duplicate elements. Example: [1, 2, 3]

  • Tuples: Ordered, immutable, allows duplicate elements. Example: (1, 2, 3)

  • Sets: Unordered, mutable, does not allow duplicate elements. Example: {1, 2, 3}

  • Dictionaries: Unordered, mutable, key-value pairs. Example: {'key': 'value'}

View 1 answer

Q20. How to prevent a threat in inside zone?

Ans.

Prevent insider threats in the inside zone

  • Implement access controls and limit privileges based on job roles

  • Monitor user activity and detect any suspicious behavior

  • Regularly educate employees on security best practices

  • Implement data loss prevention measures to prevent data exfiltration

  • Regularly review and update security policies and procedures

Add your answer

Q21. how would you handle an escalation

Ans.

I would handle an escalation by assessing the situation, communicating with all parties involved, and finding a resolution.

  • Assess the situation to understand the root cause of the escalation

  • Communicate with all parties involved to gather information and perspectives

  • Find a resolution that satisfies all parties and prevents future escalations

Add your answer

Q22. What is Composition?? Where can we use it ??

Ans.

Composition is a design technique in object-oriented programming where a class contains an object of another class.

  • Composition is used to create complex objects by combining simpler objects.

  • It allows for code reuse and modularity.

  • Composition is a 'has-a' relationship, where one class has an object of another class as a member.

  • Examples include a Car class having Engine, Wheel, and Door objects as members.

  • Composition is preferred over inheritance in many cases for better flexib...read more

Add your answer

Q23. How to create custom connectors

Ans.

Custom connectors can be created using APIs or SDKs provided by the platform.

  • Identify the platform and its available APIs/SDKs

  • Understand the data source and destination for the connector

  • Develop the connector using the chosen API/SDK

  • Test and deploy the connector

  • Provide documentation and support for the connector

Add your answer

Q24. What is the use of Routing in delivery

Ans.

Routing in delivery is the process of determining the most efficient path for delivering goods or services to their intended destination.

  • Routing helps optimize delivery routes to save time and resources

  • It ensures timely delivery by choosing the fastest or most cost-effective path

  • Routing can also involve determining the sequence of stops for multiple deliveries

  • Examples: GPS navigation systems for delivery drivers, logistics software for route planning

Add your answer

Q25. Contents of UE Capabilities received during RACH.

Ans.

UE capabilities received during RACH include supported frequency bands, modulation schemes, and maximum data rates.

  • Supported frequency bands (e.g. LTE bands 1, 3, 5)

  • Modulation schemes (e.g. QPSK, 16QAM, 64QAM)

  • Maximum data rates (e.g. 150 Mbps downlink, 50 Mbps uplink)

Add your answer

Q26. Can we use model.isvalid in .net core ?

Ans.

Yes, model.isvalid can be used in .NET Core for validating models.

  • model.isvalid is a method used for validating models in .NET Core applications.

  • It is commonly used in ASP.NET Core MVC for validating user input.

  • Example: if(model.isvalid) { // do something }

Add your answer

Q27. What is useMemo and useCallback

Ans.

useMemo and useCallback are hooks in React that optimize performance by memoizing values and functions.

  • useMemo is used to memoize a value and prevent unnecessary re-computations.

  • useCallback is used to memoize a function and prevent unnecessary re-renders.

  • Both hooks are used to optimize performance in React applications.

Add your answer

Q28. What is AI builder? Explain

Ans.

AI Builder is a Microsoft Power Platform tool that allows users to build custom AI models without coding.

  • AI Builder is a low-code tool that enables users to create AI models using pre-built templates and drag-and-drop interfaces.

  • It can be used to build models for various scenarios such as object detection, form processing, and sentiment analysis.

  • AI Builder integrates with other Microsoft Power Platform tools such as Power Apps and Power Automate.

  • It supports various data sourc...read more

Add your answer

Q29. What is Agile and waterfall model

Ans.

Agile and waterfall are software development methodologies.

  • Agile is a flexible, iterative approach where requirements and solutions evolve through collaboration between self-organizing cross-functional teams.

  • Waterfall is a linear sequential approach where each phase must be completed before the next phase begins.

  • Agile is best suited for projects with changing requirements, while waterfall is ideal for projects with well-defined requirements.

  • Agile promotes adaptive planning, e...read more

Add your answer

Q30. What is the term DLP?

Ans.

DLP stands for Data Loss Prevention.

  • DLP is a set of tools and processes used to prevent sensitive data from being lost, stolen, or accessed by unauthorized users.

  • It can be implemented through software, hardware, or a combination of both.

  • Examples of sensitive data that DLP can protect include financial information, intellectual property, and personal identifiable information (PII).

Add your answer

Q31. Difference between regression and Retesting.

Ans.

Regression testing is retesting of modified code to ensure that new code changes have not affected existing functionality.

  • Regression testing is performed to make sure that new code changes have not introduced any new bugs or issues.

  • Retesting is the process of testing the same functionality again to ensure that the reported bug has been fixed.

  • Regression testing is done after code changes, while retesting is done after bug fixes.

  • Regression testing involves running a full suite ...read more

Add your answer

Q32. What is bgp and ad value

Ans.

BGP is a routing protocol used in computer networks to exchange routing information between routers. AD value is the administrative distance assigned to a routing protocol.

  • BGP stands for Border Gateway Protocol.

  • It is commonly used in large-scale networks, such as the internet.

  • BGP allows routers to exchange information about the best paths for data packets to reach their destinations.

  • AD value is a metric used to determine the trustworthiness of a routing protocol.

  • Lower AD valu...read more

Add your answer

Q33. What are agile ceremonies

Ans.

Agile ceremonies are regular meetings or events in Agile methodology to facilitate communication, collaboration, and decision-making within the team.

  • Sprint Planning: Meeting at the start of a sprint to plan the work to be done.

  • Daily Stand-up: Short daily meeting for team members to discuss progress and plan for the day.

  • Sprint Review: Meeting at the end of a sprint to review and demonstrate the completed work.

  • Sprint Retrospective: Meeting at the end of a sprint to reflect on w...read more

Add your answer

Q34. What is the term ATP?

Ans.

ATP stands for Adenosine Triphosphate.

  • ATP is a molecule that carries energy within cells.

  • It is often referred to as the 'energy currency' of the cell.

  • ATP is produced during cellular respiration and used in various cellular processes.

  • Examples of processes that require ATP include muscle contraction and protein synthesis.

Add your answer

Q35. Different types of data types in python.

Ans.

Python data types include integers, floats, strings, lists, tuples, dictionaries, and sets.

  • Integers: whole numbers without decimals (e.g. 5, -3)

  • Floats: numbers with decimals (e.g. 3.14, -0.5)

  • Strings: sequences of characters enclosed in quotes (e.g. 'hello', '123')

  • Lists: ordered collections of items (e.g. [1, 'apple', True])

  • Tuples: ordered, immutable collections of items (e.g. (1, 'banana', False))

  • Dictionaries: unordered collections of key-value pairs (e.g. {'key': 'value', 'n...read more

Add your answer

Q36. Error handling in Power Automate

Ans.

Error handling is crucial in Power Automate to ensure smooth workflow execution.

  • Use the 'Terminate' action to stop the flow when an error occurs

  • Add 'Scope' actions to isolate and handle errors in specific parts of the flow

  • Use 'Retry Policy' to automatically retry failed actions

  • Use 'Run After' to define actions to be taken after an error occurs

  • Use 'Compose' action to create custom error messages

Add your answer

Q37. Bouquet of benefits how much

Ans.

The bouquet of benefits offered for the IT Analyst C2 position is extensive and diverse.

  • Competitive salary and compensation package

  • Healthcare benefits including medical, dental, and vision coverage

  • Retirement plans and investment options

  • Paid time off and vacation days

  • Flexible work schedule and remote work opportunities

  • Training and professional development programs

  • Employee discounts and perks

  • Opportunities for career growth and advancement

View 1 answer

Q38. how to handle Network Calls

Ans.

Handling network calls involves optimizing performance, ensuring security, and troubleshooting issues.

  • Optimize network calls by reducing unnecessary requests and using caching mechanisms.

  • Ensure security by encrypting data, implementing authentication mechanisms, and monitoring for suspicious activity.

  • Troubleshoot network issues by analyzing logs, using network monitoring tools, and testing different scenarios.

  • Use libraries like Retrofit in Android development or Axios in Java...read more

Add your answer

Q39. Api calling in functional components

Ans.

Calling APIs in functional components in React

  • Use the useEffect hook to make API calls in functional components

  • Use the fetch or axios library to make the actual API call

  • Handle the API response using state or other hooks

  • Consider using async/await or promises for handling asynchronous API calls

Add your answer

Q40. What is bgp and types

Ans.

BGP (Border Gateway Protocol) is a routing protocol used to exchange routing information between different autonomous systems (AS) on the internet.

  • BGP is an exterior gateway protocol (EGP) that allows routers in different ASes to communicate and exchange routing information.

  • It is used to determine the best path for data packets to travel across the internet.

  • BGP has two main types: eBGP (external BGP) and iBGP (internal BGP).

  • eBGP is used to exchange routing information between...read more

Add your answer

Q41. What is negative float

Ans.

Negative float is when a task is behind schedule and the amount of time needed to complete it exceeds the available time.

  • Negative float occurs when the total duration of a task exceeds the available time for completion.

  • It indicates that the task is behind schedule and there is a delay in completing it.

  • Negative float can impact the overall project schedule and may require adjustments to meet deadlines.

  • For example, if a task has a duration of 5 days but only 3 days left until t...read more

Add your answer

Q42. Difference between smoke and sanity

Ans.

Smoke testing is a preliminary test to check if the software build is stable, while sanity testing is a subset of regression testing to ensure the new changes have not affected the existing functionalities.

  • Smoke testing is done to check if the critical functionalities of the software are working fine after a new build is deployed.

  • Sanity testing is done to check if the new changes or bug fixes have not affected the existing functionalities of the software.

  • Smoke testing is a sh...read more

Add your answer

Q43. Use of patch function

Ans.

Patch function is used to update or modify software or system vulnerabilities.

  • Patch function is used to fix security vulnerabilities in software or systems.

  • It involves updating or modifying the existing code to address the vulnerability.

  • Patches can be released by software vendors or created by security researchers.

  • Regularly applying patches is important to maintain the security of systems and prevent cyber attacks.

  • Examples of patching include updating operating systems, web b...read more

Add your answer

Q44. Any working knowledge on Azure

Ans.

Yes, I have working knowledge on Azure.

  • I have experience in deploying and managing virtual machines on Azure.

  • I have worked with Azure Storage and have knowledge of Blob, Queue, and Table storage.

  • I have used Azure Functions to create serverless applications.

  • I have worked with Azure DevOps for continuous integration and deployment.

  • I have knowledge of Azure Active Directory and have integrated it with applications.

  • I have experience in monitoring and troubleshooting Azure resourc...read more

Add your answer

Q45. What are decorators

Ans.

Decorators are a design pattern in Python that allows you to add new functionality to an existing object without modifying its structure.

  • Decorators are functions that take another function as an argument and extend its behavior.

  • They are commonly used to modify or extend the behavior of functions or methods.

  • Decorators are denoted by the @ symbol followed by the decorator name.

  • They are often used for logging, authentication, caching, and more.

View 1 answer

Q46. What is Power BI

Ans.

Power BI is a business analytics tool by Microsoft that provides interactive visualizations and business intelligence capabilities.

  • Developed by Microsoft

  • Allows users to create interactive visualizations and reports

  • Integrates with various data sources such as Excel, SQL Server, and cloud services

  • Enables data exploration and sharing insights across an organization

Add your answer

Q47. Write a batch class syntax

Ans.

Batch class syntax in Salesforce for processing records in bulk

  • Batch class must implement Database.Batchable interface

  • Define start, execute, and finish methods

  • Use Database.executeBatch method to execute the batch class

  • Example: public class MyBatchClass implements Database.Batchable { //code here }

Add your answer

Q48. What is java ?

Ans.

Java is a high-level programming language known for its platform independence and object-oriented approach.

  • Java is widely used for developing desktop, web, and mobile applications.

  • It is known for its write once, run anywhere (WORA) principle.

  • Java programs are compiled into bytecode and executed by the Java Virtual Machine (JVM).

  • It supports multithreading, exception handling, and dynamic memory allocation.

  • Popular Java frameworks include Spring, Hibernate, and JavaFX.

Add your answer

Q49. What is selenium ?

Ans.

Selenium is a popular open-source automation testing framework for web applications.

  • Selenium is used for automating web browsers.

  • It supports multiple programming languages like Java, Python, C#, etc.

  • Selenium can interact with web elements, perform actions, and validate results.

  • It can handle dynamic web pages and AJAX-based applications.

  • Selenium WebDriver is the most commonly used component of Selenium.

  • Selenium Grid allows running tests on multiple machines and browsers simult...read more

Add your answer

Q50. Explain carrier aggregation.

Ans.

Carrier aggregation is a technology that combines multiple LTE carriers to increase data speeds and capacity.

  • Carrier aggregation allows multiple LTE carriers to be combined to increase data speeds and capacity.

  • It enables devices to receive data from multiple LTE carriers simultaneously.

  • This technology is commonly used in 4G LTE networks to improve network performance.

  • For example, a device may combine two 20 MHz LTE carriers to achieve a total bandwidth of 40 MHz.

Add your answer

Q51. Reverse a linked list

Ans.

Reverse a linked list by changing the pointers direction

  • Start with three pointers: current, previous, and next

  • Iterate through the linked list, updating the pointers to reverse the direction

  • Update the head of the linked list to point to the new first node

Add your answer

Q52. What is Filter ?

Ans.

A filter is a tool or technique used to limit or refine the results of a search or query.

  • Filters are commonly used in databases, search engines, and email clients to narrow down results based on specific criteria.

  • Examples of filters include date ranges, file types, keywords, and categories.

  • Filters can help users find relevant information more efficiently by excluding unwanted results.

Add your answer

Q53. Different Types of testings

Ans.

Different types of software testing include unit testing, integration testing, system testing, and acceptance testing.

  • Unit testing: Testing individual components or modules of the software.

  • Integration testing: Testing how multiple components work together.

  • System testing: Testing the entire system as a whole.

  • Acceptance testing: Testing to ensure the software meets the requirements of the end users.

Add your answer

Q54. What is SAP SD

Ans.

SAP SD (Sales and Distribution) is a module in SAP ERP system that manages sales, shipping, and billing processes.

  • SAP SD helps organizations streamline their sales processes from order to delivery.

  • It includes functionalities for sales order processing, pricing, delivery, and billing.

  • SAP SD integrates with other modules like MM (Materials Management) and FI (Financial Accounting) for a complete business solution.

  • Example: Creating a sales order in SAP SD triggers the delivery o...read more

Add your answer

Q55. Different types of waits

Ans.

Different types of waits in IT include CPU wait, I/O wait, and lock wait.

  • CPU wait occurs when a process is waiting for the CPU to become available.

  • I/O wait happens when a process is waiting for input/output operations to complete.

  • Lock wait occurs when a process is waiting for a lock to be released by another process.

Add your answer

Q56. Get and navigate difference

Ans.

Get and navigate difference

  • Get refers to retrieving data or information from a source

  • Navigate refers to moving through a system or interface to access different sections or features

  • Get is about obtaining specific data, while navigate is about moving around within a system

Add your answer

Q57. Sessions and its uses?

Ans.

Sessions are used to track user interactions with a website or application.

  • Sessions store user data temporarily on the server

  • Sessions help maintain user state across multiple pages

  • Sessions can be used for authentication and authorization purposes

  • Examples: storing user login information, shopping cart items

Add your answer

Q58. Explai about jvm and jdk

Ans.

JVM is a virtual machine that executes Java bytecode, while JDK is a software development kit that includes tools for developing Java applications.

  • JVM stands for Java Virtual Machine and is responsible for running Java bytecode

  • JDK stands for Java Development Kit and includes tools for developing Java applications

  • JDK includes JRE (Java Runtime Environment) which contains JVM

  • JDK also includes compilers, debuggers, and other tools for Java development

Add your answer

Q59. Life Cycle of Activity

Ans.

The life cycle of activity refers to the stages an activity goes through from initiation to completion.

  • Initiation: Planning and defining the scope of the activity.

  • Execution: Carrying out the planned activities.

  • Monitoring and Controlling: Tracking progress and making adjustments as needed.

  • Closure: Formal acceptance and completion of the activity.

  • Examples: Software development life cycle, project management life cycle.

Add your answer

Q60. Explain selenium architecture

Ans.

Selenium architecture is a framework that consists of various components for automating web browsers.

  • Selenium architecture includes four main components: Selenium WebDriver, Selenium Grid, Selenium IDE, and Selenium RC.

  • Selenium WebDriver is the core component that interacts with web browsers and controls their behavior.

  • Selenium Grid allows running tests on multiple machines and browsers in parallel.

  • Selenium IDE is a record and playback tool for creating test cases.

  • Selenium RC...read more

Add your answer

Q61. Complete CSV flow with example

Ans.

CSV flow is a process of importing and exporting data in CSV format.

  • CSV stands for Comma Separated Values

  • Data is organized in rows and columns

  • CSV files can be opened in Excel or any text editor

  • Example: Importing customer data from a CSV file into a database

  • Example: Exporting sales data from a database to a CSV file

Add your answer

Q62. Use of Power bi

Ans.

Power BI is a business analytics tool that allows users to visualize and share insights from their data.

  • Create interactive reports and dashboards

  • Connect to multiple data sources

  • Perform data modeling and transformation

  • Share insights with colleagues and stakeholders

  • Schedule data refreshes and automate workflows

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at null

based on 44 interviews in the last 1 year
3 Interview rounds
Technical Round 1
Technical Round 2
HR Round
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter