Add office photos
Engaged Employer

TCS

3.7
based on 93.1k Reviews
Video summary
Filter interviews by

100+ Bottomline Interview Questions and Answers

Updated 4 Apr 2025
Popular Designations

Q1. How charging protocol works in electric vehicle and what is purpose of charging pin at charging inlet

Ans.

Charging protocol in EVs and purpose of charging pin at inlet

  • Charging protocol determines how the battery is charged and how much power is delivered

  • Charging pin is used to connect the charging cable to the vehicle's charging inlet

  • Charging protocols include AC charging, DC charging, and wireless charging

  • Charging protocols also include different charging levels such as Level 1, Level 2, and Level 3

  • Purpose of charging pin is to ensure safe and reliable transfer of power from the...read more

View 1 answer

Q2. What is basic function of firewall.

Ans.

Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

  • Firewall acts as a barrier between a trusted, secure internal network and another network, such as the Internet.

  • It examines each packet of data that passes through it and determines whether to allow or block the traffic based on the set of rules.

  • Firewalls can be hardware or software-based and can be configured to block specific types of ...read more

Add your answer

Q3. What is the difference between Software Development Life Cycle (SDLC) and Software Testing Life Cycle (STLC)?

Ans.

SDLC focuses on the development of software, while STLC focuses on the testing of software.

  • SDLC involves planning, designing, coding, and deployment of software.

  • STLC involves test planning, test case development, test execution, and defect tracking.

  • SDLC is more focused on the overall software development process, while STLC is more focused on ensuring the quality of the software.

  • SDLC is a broader process that includes STLC as one of its phases.

  • Example: In SDLC, a software tea...read more

Add your answer

Q4. How would you handle a bug in a production environment in front of a client?

Ans.

I would calmly acknowledge the bug, communicate the issue and steps being taken to resolve it, and work quickly to fix it without causing panic.

  • Acknowledge the bug calmly and professionally

  • Communicate the issue and steps being taken to resolve it

  • Work quickly to fix the bug without causing panic

  • Provide updates to the client on the progress

Add your answer
Discover Bottomline interview dos and don'ts from real experiences

Q5. What are the different types of Selenium components, and can you explain each one?

Ans.

Selenium components include Selenium IDE, Selenium WebDriver, Selenium Grid, and Selenium RC.

  • Selenium IDE: Record and playback tool for creating test scripts without programming.

  • Selenium WebDriver: Automation tool for writing test scripts in various programming languages.

  • Selenium Grid: Tool for running tests in parallel on multiple machines or browsers.

  • Selenium RC (Remote Control): Deprecated tool for running tests in multiple browsers.

Add your answer

Q6. What is middleware in nodejs? Explain with examples.

Ans.

Middleware in Node.js is a function that sits between the server and the client and performs various tasks.

  • Middleware functions can be used to handle requests, modify responses, and perform authentication and authorization.

  • Examples of middleware in Node.js include body-parser, cookie-parser, and express-session.

  • Middleware functions are executed in the order they are defined in the code.

  • Middleware can be used to handle errors and pass them to the error handling middleware.

Add your answer
Are these interview questions helpful?

Q7. Explain in detail about how you configure your api w.r.t frontend.

Ans.

API configuration for frontend

  • Define API endpoints and methods

  • Ensure API responses are in the correct format for frontend

  • Implement authentication and authorization

  • Optimize API performance for frontend usage

  • Document API usage for frontend developers

Add your answer

Q8. What is Control Coupling and Data Coupling? Explain the difference between them

Ans.

Control coupling and data coupling are two types of coupling in software engineering.

  • Control coupling occurs when one module controls the flow of another module through parameters or flags.

  • Data coupling occurs when two modules share data through parameters or global variables.

  • Control coupling is considered more tightly coupled than data coupling.

  • Examples of control coupling include passing a flag to a function to determine its behavior, or using a return value to control the ...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What is the difference between Router and firewall

Ans.

Routers connect networks while firewalls protect networks from unauthorized access.

  • Routers direct traffic between networks while firewalls filter traffic based on predefined rules.

  • Routers operate at layer 3 of the OSI model while firewalls operate at layer 4 or higher.

  • Examples of routers include Cisco routers, while examples of firewalls include Fortinet firewalls.

  • Routers can be used to segment networks while firewalls can be used to block malicious traffic.

  • Routers are essent...read more

Add your answer

Q10. Which are the difference Routing protocols

Ans.

Routing protocols are used to determine the best path for data to travel in a network.

  • Distance Vector protocols: RIP, IGRP, EIGRP

  • Link State protocols: OSPF, IS-IS

  • Hybrid protocols: BGP

  • Path Vector protocols: BGP

  • IGP vs EGP

Add your answer

Q11. What is the difference between retesting and regression testing?

Ans.

Retesting focuses on testing the same functionality again, while regression testing focuses on testing the impact of changes on existing functionalities.

  • Retesting is done to ensure that a specific bug or issue has been fixed properly.

  • Regression testing is done to ensure that new code changes have not adversely affected existing functionalities.

  • Retesting is usually performed by the same tester who found the bug, while regression testing can be performed by any tester.

  • Examples:...read more

Add your answer

Q12. What tools are available in the market for automation testing?

Ans.

Some popular tools for automation testing include Selenium, Appium, JUnit, TestNG, and Cucumber.

  • Selenium: widely used for web application testing

  • Appium: for mobile application testing

  • JUnit: for unit testing in Java

  • TestNG: for testing in Java

  • Cucumber: for behavior-driven development testing

Add your answer

Q13. What is the difference between smoke testing and sanity testing?

Ans.

Smoke testing is a preliminary test to check if the software build is stable, while sanity testing is a subset of regression testing to verify specific functionality.

  • Smoke testing is done to ensure the critical functionalities of the software are working fine after a build, while sanity testing is done to verify specific changes or fixes.

  • Smoke testing is a shallow and wide approach to testing, covering all major areas of the software, while sanity testing is a focused and nar...read more

Add your answer

Q14. Which are the BGP attributes

Ans.

BGP attributes are used to determine the best path for routing traffic between networks.

  • BGP attributes include: AS Path, Next Hop, Local Preference, MED, Origin, and Community

  • AS Path is a list of autonomous systems that the route has passed through

  • Next Hop is the IP address of the next router on the path

  • Local Preference is used to indicate the preferred path for outbound traffic

  • MED (Multi-Exit Discriminator) is used to indicate the preferred path for inbound traffic

  • Origin ind...read more

View 2 more answers

Q15. What is encapsulation in the context of object-oriented programming?

Ans.

Encapsulation is the concept of bundling data and methods that operate on the data into a single unit, known as a class.

  • Encapsulation helps in hiding the internal state of an object and restricting access to it.

  • It allows for data hiding, which prevents outside code from directly accessing an object's internal state.

  • Methods within a class can be used to control access to the data, ensuring that it is only modified in a controlled manner.

  • Encapsulation promotes code reusability ...read more

Add your answer

Q16. Difference between SQL and NoSql database?

Ans.

SQL databases are relational and use structured query language, while NoSQL databases are non-relational and use various data models.

  • SQL databases are based on a fixed schema, while NoSQL databases are schema-less.

  • SQL databases use tables to store data, while NoSQL databases use various data models like key-value, document, columnar, or graph.

  • SQL databases are better suited for complex queries and structured data, while NoSQL databases are more flexible and scalable for unstr...read more

View 3 more answers

Q17. What are the lifecycle hooks in Angular and how do they function?

Ans.

Lifecycle hooks in Angular allow developers to tap into key events in a component's lifecycle for custom behavior.

  • ngOnInit: Called once after the first ngOnChanges. Ideal for initialization logic. Example: Fetching data from a service.

  • ngOnChanges: Invoked before ngOnInit and whenever one or more data-bound input properties change. Example: Reacting to input changes.

  • ngDoCheck: Called during every change detection run. Useful for custom change detection. Example: Checking for s...read more

Add your answer

Q18. 5.which is the parent class of all classes in Java?

Ans.

The parent class of all classes in Java is the Object class.

  • All classes in Java implicitly extend the Object class.

  • The Object class provides basic methods such as toString(), equals(), and hashCode().

  • Any class can override these methods to provide custom implementations.

  • Example: public class MyClass extends Object { ... }

  • Example: Object obj = new MyClass();

Add your answer

Q19. How does inverter works. How is motor control

Ans.

Inverter converts DC to AC. Motor control involves adjusting frequency and voltage of AC to control motor speed.

  • Inverter uses power electronics to convert DC to AC

  • Motor control involves adjusting frequency and voltage of AC to control motor speed

  • Frequency and voltage are adjusted using pulse width modulation (PWM)

  • Motor speed can be controlled by adjusting the duty cycle of PWM signal

  • Examples of motor control techniques include scalar control and vector control

Add your answer

Q20. What is a subquery? How is it different from a join?

Ans.

A subquery is a query nested within another SQL query, while a join combines rows from two or more tables based on related columns.

  • A subquery can return a single value or a set of values to be used in the main query.

  • Example of a subquery: SELECT name FROM employees WHERE id IN (SELECT employee_id FROM sales);

  • Joins combine rows from two or more tables based on a related column between them.

  • Example of a join: SELECT employees.name, sales.amount FROM employees JOIN sales ON empl...read more

Add your answer

Q21. How to join table? How many types of join in my SQL and SQL?

Ans.

Joining tables in SQL allows combining data from multiple tables based on related columns. Various join types exist.

  • 1. INNER JOIN: Returns records with matching values in both tables. Example: SELECT * FROM A INNER JOIN B ON A.id = B.id;

  • 2. LEFT JOIN (or LEFT OUTER JOIN): Returns all records from the left table and matched records from the right table. Example: SELECT * FROM A LEFT JOIN B ON A.id = B.id;

  • 3. RIGHT JOIN (or RIGHT OUTER JOIN): Returns all records from the right ta...read more

Add your answer

Q22. Do you have any previous project. If yes what programming language it is in?

Ans.

Yes, I have worked on a project where I developed a web application using Java programming language.

  • Developed a web application using Java programming language

  • Implemented various features and functionalities

  • Collaborated with a team of developers to ensure project success

Add your answer

Q23. What is your understanding of Java Object-Oriented Programming (OOP)?

Ans.

Java OOP is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.

  • Java OOP involves the use of classes and objects.

  • Encapsulation is a key concept where data is kept private within a class and accessed through public methods.

  • Inheritance allows one class to inherit attributes and methods from another class.

  • Polymorphism enables objects to be treated as instances of their parent class.

  • Abstraction in...read more

Add your answer

Q24. 1) Internals of Hashmap 2) What is the ER diagram, and draw the ER diagram of your project. 3) What is Synchronization in Java? Explain Deadlock.

Ans.

A hashmap is a data structure that stores key-value pairs and provides fast retrieval of values based on their keys.

  • Hashmap is implemented using an array of linked lists or a balanced tree

  • It uses a hash function to convert keys into array indices

  • Collision can occur when two keys hash to the same index, resolved using separate chaining or open addressing

  • Retrieval of values is fast as it directly calculates the index using the hash function

  • Insertion and deletion operations can ...read more

Add your answer

Q25. 2.What is difference between stack and queue?

Ans.

Stack is a LIFO data structure while Queue is a FIFO data structure.

  • Stack follows Last In First Out (LIFO) principle while Queue follows First In First Out (FIFO) principle.

  • Stack has two main operations: push and pop while Queue has two main operations: enqueue and dequeue.

  • Stack is used in recursive function calls, undo/redo operations, and backtracking while Queue is used in breadth-first search, printing tasks in order, and handling requests in a web server.

  • Examples of Stac...read more

Add your answer

Q26. What is the difference between INNER JOIN and OUTER JOIN?

Ans.

INNER JOIN returns matching rows, while OUTER JOIN returns all rows with matches and NULLs for non-matching rows.

  • INNER JOIN: Combines rows from two tables where there is a match in both tables.

  • Example: SELECT * FROM A INNER JOIN B ON A.id = B.id; // Returns only matching rows.

  • OUTER JOIN: Combines rows from two tables, returning all rows from one table and matching rows from the other.

  • Types of OUTER JOIN: LEFT JOIN (all from left, matched from right), RIGHT JOIN (all from righ...read more

Add your answer

Q27. 3.Write SQL query to find second highest salary in database?

Ans.

SQL query to find second highest salary in database

  • Use ORDER BY and LIMIT to get the second highest salary

  • Assume ties are allowed and use DISTINCT

Add your answer

Q28. Linux / windows which one is more secure?

Ans.

Both Linux and Windows have their own security features and vulnerabilities.

  • Linux is known for its strong security features like SELinux and AppArmor.

  • Windows has improved its security with features like Windows Defender and BitLocker.

  • However, both operating systems have had their fair share of security vulnerabilities and attacks.

  • Ultimately, the level of security depends on how well the system is configured and maintained.

  • It's important to regularly update and patch both Linu...read more

Add your answer

Q29. what should a system administrator`s routine be?

Ans.

A system administrator's routine involves monitoring system performance, troubleshooting issues, implementing security measures, and maintaining backups.

  • Regularly monitoring system performance and resource usage

  • Troubleshooting and resolving technical issues as they arise

  • Implementing and maintaining security measures to protect the system from cyber threats

  • Performing regular backups and ensuring data integrity

  • Updating software and firmware to ensure system stability and securi...read more

Add your answer

Q30. Write a code for swapping of 2 numbers without using 3rd variable

Ans.

Swapping two numbers without using a third variable in code

  • Use bitwise XOR operation to swap two numbers without using a third variable

  • Example: a = 5, b = 7. a = a XOR b, b = a XOR b, a = a XOR b

  • Ensure to handle edge cases like swapping same numbers

Add your answer

Q31. 4. Difference Between method overloading and method overriding?

Ans.

Method overloading is having multiple methods with the same name but different parameters. Method overriding is having a method in a subclass with the same name and parameters as a method in its superclass.

  • Method overloading is done within the same class while method overriding is done in different classes (subclass and superclass).

  • Method overloading is achieved by changing the number of parameters or the data type of parameters while method overriding is achieved by changing...read more

Add your answer

Q32. What you know about electric vehicle

Ans.

Electric vehicles are vehicles that run on electricity instead of gasoline or diesel.

  • Electric vehicles use rechargeable batteries to power an electric motor.

  • They produce zero emissions, making them environmentally friendly.

  • Electric vehicles can be charged at home or at public charging stations.

  • They are becoming more popular as technology improves and prices decrease.

  • Examples of electric vehicles include the Tesla Model S, Nissan Leaf, and Chevy Bolt.

Add your answer

Q33. What is difference between Machine Learning and Deep Learning

Ans.

Machine learning is a subset of AI that allows systems to learn from data and make predictions, while deep learning is a subset of machine learning that uses neural networks to model and process data.

  • Machine learning is a broader concept that involves algorithms that can learn from and make predictions on data.

  • Deep learning is a subset of machine learning that uses neural networks with multiple layers to model and process data.

  • Deep learning requires a large amount of data and...read more

Add your answer

Q34. What is GitHub, and what is its purpose?

Ans.

GitHub is a web-based platform for version control using Git, facilitating collaboration and code sharing among developers.

  • GitHub is used for hosting and sharing code repositories.

  • It allows for version control using Git, enabling developers to track changes and collaborate on projects.

  • Developers can create branches, submit pull requests, and merge code changes easily.

  • GitHub provides features like issue tracking, wikis, and project management tools.

  • Popular open-source projects...read more

Add your answer

Q35. SQL joins difference, daily activities whatever done in previous organization

Ans.

Explained SQL joins and daily activities from previous organization.

  • Explained different types of SQL joins such as inner join, left join, right join, and full outer join.

  • Gave examples of how to use SQL joins to combine data from multiple tables.

  • Discussed daily activities such as troubleshooting database issues, optimizing queries, and creating reports.

  • Mentioned experience with database management systems like MySQL, Oracle, and SQL Server.

Add your answer

Q36. Explain this line public static void main (string args [])

Ans.

Entry point of Java program, must be public, static, void and accept array of strings as argument.

  • public: method can be accessed from anywhere

  • static: method belongs to class, not instance

  • void: method does not return any value

  • main: method name, entry point of program

  • string args[]: array of strings, command line arguments

Add your answer

Q37. Difference between ArrayList, HashSet and HashMap

Ans.

ArrayList is a resizable array, HashSet is an unordered collection of unique elements, and HashMap is a key-value pair collection.

  • ArrayList allows duplicates and maintains insertion order

  • HashSet does not allow duplicates and does not maintain order

  • HashMap stores key-value pairs and allows null values for both keys and values

Add your answer

Q38. What is Ansible How to maintains secret in Ansible How to monitor k8s

Ans.

Ansible is an open-source automation tool that helps in configuration management, application deployment, and task automation.

  • Ansible uses YAML syntax to define tasks and playbooks

  • It uses SSH protocol to communicate with remote servers

  • Ansible Vault is used to maintain secrets like passwords, API keys, etc.

  • To monitor k8s, Ansible provides modules like k8s_info, k8s_scale, k8s_service, etc.

Add your answer

Q39. what is different between workgroup and domain

Ans.

Workgroup is a peer-to-peer network where each computer has its own security settings, while a domain is a centralized network managed by a server with shared security settings.

  • Workgroup is decentralized, each computer manages its own security settings

  • Domain is centralized, managed by a server with shared security settings

  • Workgroup is suitable for small networks, domain is suitable for larger networks

  • In a workgroup, users have to create accounts on each computer they want to ...read more

Add your answer

Q40. Where you check the application logs in SAP?

Ans.

Application logs in SAP can be checked in transaction code SLG1.

  • Application logs can be checked in transaction code SLG1.

  • Logs can also be viewed in transaction code SM21 for system logs.

  • Use transaction code ST11 for developer traces.

  • Logs can be accessed directly in the file system using transaction AL11.

Add your answer

Q41. Difference between Abstract Class and Interface

Ans.

Abstract class is a class that can have both abstract and non-abstract methods while interface only has abstract methods.

  • Abstract class can have constructors while interface cannot

  • A class can implement multiple interfaces but can only inherit from one abstract class

  • Abstract class can have instance variables while interface cannot

  • Abstract class can provide default implementation for some methods while interface cannot

  • Example of abstract class: Animal (with abstract method 'mak...read more

Add your answer

Q42. What is difference between malloc and calloc

Ans.

malloc allocates memory but does not initialize it, while calloc allocates and initializes memory to zero.

  • malloc() takes a single argument, the number of bytes to allocate, while calloc() takes two arguments, the number of elements to allocate and the size of each element.

  • malloc() returns a pointer to the allocated memory block, while calloc() returns a pointer to the first byte of the allocated memory block.

  • calloc() is useful for allocating memory for arrays, as it initializ...read more

Add your answer

Q43. What is public and instance class

Ans.

Public and instance classes are two types of classes in object-oriented programming.

  • Public classes can be accessed from anywhere in the program, while instance classes can only be accessed within their own instance.

  • Public classes are often used for utility classes or classes that need to be accessed globally, while instance classes are used for encapsulation and data hiding.

  • Example of public class: Math class in Java. Example of instance class: Person class with private insta...read more

Add your answer

Q44. What do you know about Angular?

Ans.

Angular is a popular JavaScript framework for building web applications.

  • Angular is a TypeScript-based open-source framework developed by Google.

  • It is used for building single-page applications (SPAs) and dynamic web pages.

  • Angular follows the MVC (Model-View-Controller) architectural pattern.

  • It provides features like data binding, dependency injection, and modular development.

  • Angular has a powerful CLI (Command Line Interface) for scaffolding and managing projects.

  • Some popular...read more

View 1 answer

Q45. Swap two variables values without using third variable

Ans.

Swap two variables values without using third variable

  • Use XOR operation to swap two variables without using a third variable

  • Example: a = 5, b = 10. a = a XOR b, b = a XOR b, a = a XOR b

  • Ensure variables are not the same to avoid getting zero as result

Add your answer

Q46. What is software development life cycle?

Ans.

Software development life cycle (SDLC) is a process used to design, develop, and test software.

  • SDLC consists of several phases including planning, analysis, design, implementation, testing, and maintenance.

  • Each phase has its own set of activities and deliverables.

  • SDLC helps ensure that software is developed efficiently, meets user requirements, and is of high quality.

  • Examples of SDLC models include Waterfall, Agile, and DevOps.

Add your answer

Q47. What is meant by method overloading?

Ans.

Method overloading is when multiple methods in a class have the same name but different parameters.

  • Allows multiple methods with the same name but different parameters

  • Helps improve code readability and maintainability

  • Example: void print(int num) and void print(String text) in a class

Add your answer

Q48. Is Java a complete OOP language?

Ans.

Yes, Java is a complete OOP language with features like classes, objects, inheritance, encapsulation, and polymorphism.

  • Java supports classes and objects for creating reusable code.

  • It implements inheritance, allowing classes to inherit attributes and methods from other classes.

  • Encapsulation is achieved through access modifiers like private, protected, and public.

  • Polymorphism is supported through method overloading and overriding.

  • Java also includes features like abstraction and...read more

Add your answer

Q49. Current technology in my core field

Ans.

Current technology in my core field is focused on automation, cloud computing, and artificial intelligence.

  • Automation is being used to streamline processes and increase efficiency.

  • Cloud computing is becoming more prevalent as companies move towards remote work and data storage.

  • Artificial intelligence is being used for data analysis and decision-making.

  • Machine learning is being used to improve automation and AI capabilities.

  • Internet of Things (IoT) is being used to connect dev...read more

View 3 more answers

Q50. VSAMs. Define, access and Alternate index.

Ans.

VSAMs are Virtual Storage Access Method datasets used in mainframe systems for efficient data storage and retrieval.

  • VSAMs are used to store large amounts of data in a mainframe system.

  • They provide efficient access to data through various access methods like sequential, random, and dynamic.

  • Alternate index is a feature of VSAM that allows data to be accessed through a secondary key instead of the primary key.

  • VSAMs are commonly used for storing transactional data in banking and ...read more

Add your answer

Q51. How to perform keyboard events in selenium

Ans.

Keyboard events in Selenium can be performed using the Actions class

  • Use the Actions class to create a new instance

  • Use the sendKeys method to send keyboard events like typing text

  • Use the keyDown and keyUp methods to simulate pressing and releasing keys

Add your answer

Q52. 1.What is Opps concepts in Java.

Ans.

OOPs concepts in Java are the fundamental principles of object-oriented programming.

  • Encapsulation: wrapping data and code into a single unit

  • Inheritance: creating new classes from existing ones

  • Polymorphism: using a single interface to represent multiple types

  • Abstraction: hiding implementation details from the user

  • Examples: class, object, inheritance, polymorphism, encapsulation

Add your answer

Q53. What is C, advantages of c...etc?

Ans.

C is a high-level programming language known for its efficiency, flexibility, and portability.

  • Advantages of C include high performance, close-to-hardware functionality, and a large library of functions.

  • C is widely used in system programming, embedded systems, and developing operating systems.

  • C allows for low-level manipulation of memory and provides direct access to hardware, making it suitable for developing device drivers.

  • C is portable across different platforms and compile...read more

Add your answer

Q54. Use of Static Variable in Java

Ans.

Static variables in Java are shared among all instances of a class and retain their value throughout the program.

  • Static variables are declared using the 'static' keyword.

  • They are initialized only once, at the start of the program.

  • They can be accessed directly using the class name, without creating an instance of the class.

  • Changes made to a static variable are reflected in all instances of the class.

  • Static variables are commonly used for constants or to keep track of global st...read more

View 2 more answers

Q55. How to handle option values in swift

Ans.

Option values in Swift can be handled using enums, switch statements, and optional binding.

  • Use enums to define a set of possible values for an option

  • Use switch statements to handle each possible value of the option

  • Use optional binding to safely unwrap optional values

Add your answer

Q56. How to do API using service manager

Ans.

APIs can be created using Service Manager by defining endpoints and methods for interacting with the service.

  • Define the API endpoints and methods in the Service Manager configuration.

  • Implement the logic for handling API requests and responses.

  • Test the API endpoints using tools like Postman to ensure functionality.

  • Secure the API by implementing authentication and authorization mechanisms.

Add your answer

Q57. What is merge Sort? Write the code?

Ans.

Merge Sort is a divide and conquer algorithm that sorts an array by dividing it into two halves, sorting them separately, and then merging the results.

  • Divide the array into two halves

  • Recursively sort the two halves

  • Merge the sorted halves

  • Repeat until the entire array is sorted

Add your answer

Q58. What are new features in angular13?

Ans.

Angular 13 is not released yet, so there are no new features to discuss.

  • Angular 13 has not been released yet

  • No official information on new features available

Add your answer

Q59. What is lazy loading in angular ?

Ans.

Lazy loading in Angular is a technique used to load modules only when they are required, improving performance by reducing initial load time.

  • Lazy loading helps in reducing the initial bundle size of the application.

  • It allows for faster loading times as only the required modules are loaded when needed.

  • Lazy loading is achieved by using the loadChildren property in the route configuration of Angular modules.

  • Example: loadChildren: () => import('./lazy-loaded-module').then(m => m....read more

Add your answer

Q60. How VPN works

Ans.

VPN stands for Virtual Private Network. It allows secure remote access to a private network over the internet.

  • VPN creates a secure and encrypted connection between the user's device and the private network.

  • It masks the user's IP address and location, providing anonymity and privacy.

  • VPN uses different protocols such as PPTP, L2TP, IPSec, and OpenVPN.

  • It can be used to access geographically restricted content, bypass censorship, and protect against cyber threats.

  • VPN can be set u...read more

Add your answer

Q61. What is VTP

Ans.

VTP stands for VLAN Trunking Protocol, used to manage VLANs in a switched network.

  • VTP is a Cisco proprietary protocol.

  • It allows for easy VLAN management by propagating VLAN information across the network.

  • VTP operates in three modes: server, client, and transparent.

  • Server mode allows for VLAN creation, deletion, and modification.

  • Client mode receives and stores VLAN information.

  • Transparent mode forwards VTP messages but does not participate in VTP updates.

  • VTP version 3 introduc...read more

Add your answer

Q62. What do you understand by AAA ?

Ans.

AAA stands for Authentication, Authorization, and Accounting.

  • Authentication: verifying the identity of a user or device

  • Authorization: granting access to specific resources or actions

  • Accounting: tracking and recording usage of resources for billing or auditing purposes

Add your answer

Q63. Probability for to pick a gold ball out of 100balls

Ans.

The probability of picking a gold ball out of 100 balls is 1%

  • The probability is calculated by dividing the number of gold balls by the total number of balls

  • Assuming there is only one gold ball, the probability is 1/100 or 0.01

  • If there are multiple gold balls, the probability will be higher

Add your answer

Q64. How to configure NFS, NTP,DNS servers

Ans.

To configure NFS, NTP, and DNS servers, you need to edit configuration files and restart the respective services.

  • Edit /etc/exports file for NFS server configuration

  • Edit /etc/ntp.conf file for NTP server configuration

  • Edit /etc/named.conf file for DNS server configuration

  • Restart nfs, ntp, and named services after making changes

Add your answer

Q65. What is Angular and it's advantages

Ans.

Angular is a popular front-end framework developed by Google for building dynamic web applications.

  • Angular is based on TypeScript, a superset of JavaScript, which adds static typing and other features to the language.

  • It follows the MVC (Model-View-Controller) architecture, making it easier to organize code and separate concerns.

  • Angular provides two-way data binding, which allows changes in the model to be automatically reflected in the view and vice versa.

  • It offers a rich set...read more

Add your answer

Q66. Which version of Angular have you used

Ans.

I have used Angular 2, 4, 5, 6, 7, 8, 9, and 10.

  • I have experience in developing web applications using Angular 2 and above.

  • I have worked on Angular projects with various versions including 4, 5, 6, 7, 8, 9, and 10.

  • I am familiar with the latest features and updates in Angular 10.

  • I have used Angular CLI for creating and managing Angular projects.

  • I have experience in implementing Angular Material design components.

  • I have worked on projects that involve integrating Angular with b...read more

Add your answer

Q67. Difference between public ,private and protected in java

Ans.

In Java, public, private, and protected are access modifiers used to control the visibility of classes, methods, and variables.

  • public: accessible from any other class

  • private: accessible only within the same class

  • protected: accessible within the same package and subclasses

  • Example: public class MyClass {}

  • Example: private int myVar;

  • Example: protected void myMethod() {}

Add your answer

Q68. How to save and load ML model weights?

Ans.

ML model weights can be saved and loaded using serialization libraries like pickle or joblib.

  • Use serialization libraries like pickle or joblib to save and load model weights.

  • For saving weights: model.save_weights('model_weights.h5')

  • For loading weights: model.load_weights('model_weights.h5')

Add your answer

Q69. What is eventloop in nodejs?

Ans.

Eventloop is a mechanism in Node.js that allows non-blocking I/O operations to be performed efficiently.

  • Eventloop is responsible for handling asynchronous callbacks in Node.js

  • It continuously checks the event queue for new events to process

  • It executes the callbacks in the event queue in a non-blocking manner

  • It allows Node.js to handle multiple requests simultaneously

  • It is a key feature that makes Node.js highly scalable

Add your answer

Q70. What is super class?

Ans.

A super class is a class that is inherited by other classes, providing them with common attributes and behaviors.

  • Super class is also known as a base class or parent class.

  • It serves as a blueprint for creating derived classes.

  • Derived classes inherit the properties and methods of the super class.

  • Super class can be extended or overridden by the derived classes.

  • Super class promotes code reusability and modularity.

  • Example: In a vehicle hierarchy, 'Vehicle' can be a super class wit...read more

View 2 more answers

Q71. What is polymorphism and OOPs concept

Ans.

Polymorphism is the ability of a single function or method to operate on different data types. OOPs concept refers to Object-Oriented Programming principles like inheritance, encapsulation, and abstraction.

  • Polymorphism allows a function to take different forms based on the input data type.

  • OOPs concept includes inheritance, where a class can inherit properties and methods from another class.

  • Encapsulation involves bundling data and methods that operate on the data into a single...read more

Add your answer

Q72. How do you resolve a production issue?

Ans.

I follow a systematic approach by identifying the root cause, implementing a temporary fix if needed, testing the solution, and documenting the resolution.

  • Identify the root cause of the issue

  • Implement a temporary fix if necessary to restore production

  • Test the solution to ensure it resolves the issue

  • Document the resolution for future reference

Add your answer

Q73. What is Android framework architecture

Ans.

Android framework architecture is a set of APIs provided by the Android SDK to support the development of applications on the Android platform.

  • Consists of various layers such as application framework, libraries, runtime, and Linux kernel

  • Provides developers with tools and APIs to build and interact with applications

  • Includes components like Activity Manager, Content Providers, View System, and Package Manager

Add your answer

Q74. What is function in Oracle PL/SQL.

Ans.

A function in Oracle PL/SQL is a stored subprogram that returns a single value and can be called from SQL statements.

  • Functions are defined using the CREATE FUNCTION statement.

  • They can take parameters and return a value using the RETURN keyword.

  • Example: CREATE FUNCTION get_employee_salary(emp_id NUMBER) RETURN NUMBER IS ... END;

  • Functions can be used in SQL queries, e.g., SELECT get_employee_salary(101) FROM dual;

  • They help in code reusability and modular programming.

Add your answer

Q75. What is pandas and how to use

Ans.

pandas is a Python library used for data manipulation and analysis.

  • pandas provides data structures like DataFrame and Series for handling data

  • It can read and write data from various file formats like CSV, Excel, SQL databases

  • pandas allows for data cleaning, filtering, grouping, and merging operations

  • Example: df = pd.read_csv('data.csv') creates a DataFrame from a CSV file

Add your answer

Q76. Tell me the life cycle of mvc

Ans.

MVC life cycle involves request handling, routing, controller execution, view rendering, and response generation.

  • Client sends a request to the server

  • Routing maps the request to a specific controller

  • Controller executes the requested action and interacts with the model

  • View is rendered with the data from the model

  • Response is generated and sent back to the client

Add your answer

Q77. What are Python’s built-in decorators?

Ans.

Python's built-in decorators are functions that modify the behavior of other functions or methods.

  • 1. @staticmethod: Defines a method that does not operate on an instance of the class. Example: class MyClass: @staticmethod def my_method(): pass

  • 2. @classmethod: Defines a method that operates on the class itself rather than an instance. Example: class MyClass: @classmethod def my_class_method(cls): pass

  • 3. @property: Allows a method to be accessed like an attribute. Example: clas...read more

Add your answer

Q78. Python coad to find 2nd largest number in arrey

Ans.

Python code to find the 2nd largest number in an array.

  • Sort the array in descending order

  • Return the element at index 1

Add your answer

Q79. write a program to show patterns

Ans.

Program to display patterns using arrays of strings

  • Use nested loops to iterate through rows and columns of the array

  • Fill the array with characters to create the desired pattern

  • Print each row of the array to display the pattern

Add your answer

Q80. Tell about cyber security?

Ans.

Cyber security refers to the practice of protecting computer systems, networks, and sensitive information from unauthorized access, theft, or damage.

  • Cyber security involves implementing measures to prevent cyber attacks and data breaches.

  • It includes using firewalls, antivirus software, and encryption to protect systems and data.

  • Cyber security also involves educating users about safe online practices and implementing policies and procedures to ensure security.

  • Examples of cyber...read more

Add your answer

Q81. What does OOP stand for?

Ans.

OOP stands for Object-Oriented Programming.

  • OOP is a programming paradigm based on the concept of 'objects', which can contain data in the form of fields (attributes or properties) and code in the form of procedures (methods)

  • Encapsulation, inheritance, and polymorphism are key principles of OOP

  • Examples of OOP languages include Java, C++, and Python

Add your answer

Q82. What is grep in Linux?

Ans.

Grep is a command-line utility in Linux used to search for specific patterns in text files.

  • Grep stands for 'Global Regular Expression Print'.

  • It is used to search for a specific pattern in one or more files.

  • Grep can be used with regular expressions to perform complex pattern matching.

  • Example: grep 'search_term' file.txt

  • Example: grep -i 'pattern' file1.txt file2.txt

Add your answer

Q83. Write a code on bubble sort in c?

Ans.

Bubble sort is a simple sorting algorithm that repeatedly steps through the list, compares adjacent elements and swaps them if they are in the wrong order.

  • Initialize an array of strings to be sorted

  • Use nested loops to compare adjacent elements and swap them if necessary

  • Repeat the process until the array is sorted

Add your answer

Q84. Introduction project details why IT coding

Ans.

I have experience working on various IT projects involving coding, which is why I am interested in the System Engineer role.

  • I have worked on multiple IT projects where I was responsible for coding and system engineering tasks.

  • I am passionate about IT and enjoy the challenge of problem-solving through coding.

  • I believe that my coding skills and experience make me a strong candidate for the System Engineer position.

Add your answer

Q85. What is IAM? What is AD?

Ans.

IAM stands for Identity and Access Management. AD stands for Active Directory.

  • IAM is a framework for managing digital identities and controlling access to resources.

  • AD is a Microsoft product that provides directory services, authentication, and authorization.

  • IAM and AD are often used together to manage user access to resources in an organization.

  • IAM solutions include Okta, OneLogin, and Azure AD.

  • AD is commonly used in Windows environments to manage user accounts, computers, a...read more

Add your answer

Q86. What is Java and spring boot ?

Ans.

Java is a popular programming language used for developing various applications. Spring Boot is a framework that simplifies the development of Java-based applications.

  • Java is an object-oriented programming language known for its portability and versatility.

  • Spring Boot is a framework that simplifies the development of Java-based applications by providing pre-configured settings and tools.

  • Spring Boot allows developers to quickly set up and run standalone Spring-based applicatio...read more

Add your answer

Q87. What is MVC? How it works

Ans.

MVC stands for Model-View-Controller. It is a software design pattern used to separate an application's concerns.

  • Model represents the data and business logic

  • View displays the data to the user

  • Controller handles user input and updates the model and view accordingly

  • MVC promotes separation of concerns and modularity

  • Examples include Ruby on Rails, ASP.NET MVC, and Spring MVC

Add your answer

Q88. What is Abstract Class

Ans.

An abstract class is a class that cannot be instantiated and is meant to be subclassed.

  • An abstract class serves as a blueprint for other classes.

  • It can have both abstract and non-abstract methods.

  • Abstract methods are declared without an implementation and must be implemented by the subclasses.

  • An abstract class can have constructors and instance variables.

  • It provides a common interface for all the subclasses.

Add your answer

Q89. What is Array and String

Ans.

An array is a data structure that stores a collection of elements of the same type. A string is a sequence of characters.

  • Arrays can be one-dimensional, two-dimensional, or multi-dimensional.

  • Strings are typically used to represent text and are enclosed in quotation marks.

  • Arrays and strings are both commonly used in programming languages.

  • Example of an array: [1, 2, 3, 4, 5]

  • Example of a string: 'Hello, World!'

Add your answer

Q90. Real life examples of Data Structure

Ans.

Data structures are used in various real-life scenarios to organize and manage data efficiently.

  • Phone contacts stored in a hash table for quick access

  • Employee records stored in a linked list for easy insertion and deletion

  • File system organized as a tree structure for hierarchical storage

Add your answer

Q91. List out 5 DB related spring boot annotations?

Add your answer

Q92. What's SQL and why we use it?

Ans.

SQL is a programming language used for managing and manipulating relational databases.

  • SQL stands for Structured Query Language

  • It is used to communicate with databases to perform tasks such as querying data, updating data, and creating databases

  • Examples of SQL commands include SELECT, INSERT, UPDATE, DELETE

  • SQL is essential for managing large amounts of data efficiently

Add your answer

Q93. What is new in Java 11

Ans.

Java 11 introduces new features like local variable type inference, HTTP client API, and Epsilon garbage collector.

  • Local variable type inference allows the compiler to infer the type of a local variable based on its initializer.

  • HTTP client API provides a standard API for making HTTP requests and handling responses.

  • Epsilon garbage collector is a no-op garbage collector that can be used for performance testing and short-lived applications.

  • Other features include Unicode 10 suppo...read more

Add your answer

Q94. Mail flow in on premise and o365 environment

Ans.

Mail flow in on-premise and O365 environment

  • In on-premise environment, mail flow is managed by Exchange servers installed on-premises

  • In O365 environment, mail flow is managed by Exchange Online Protection (EOP) and Exchange Online servers

  • In a hybrid environment, mail flow can be managed by both on-premise Exchange servers and EOP/Exchange Online servers

  • Mail flow can be configured using connectors, transport rules, and mail flow policies

Add your answer

Q95. How to handal application

Ans.

Handling applications involves monitoring, troubleshooting, and optimizing performance.

  • Monitor application performance regularly to identify any issues or bottlenecks

  • Troubleshoot any errors or bugs that arise in the application

  • Optimize the application by fine-tuning configurations and resources

  • Implement security measures to protect the application from threats

  • Document changes and updates made to the application for future reference

Add your answer

Q96. what is oops and its feature

Ans.

OOPs stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.

  • OOPs features include encapsulation, inheritance, polymorphism, and abstraction.

  • Encapsulation refers to the bundling of data with the methods that operate on that data.

  • Inheritance allows classes to inherit attributes and methods from other classes.

  • Polymorphism allows objects to be treated as ...read more

Add your answer

Q97. Difference in .net framework and core

Ans.

The .NET Framework is a traditional framework for Windows applications, while .NET Core is a cross-platform, open-source framework.

  • The .NET Framework is primarily for Windows applications, while .NET Core is cross-platform and can run on Windows, macOS, and Linux.

  • The .NET Framework is closed-source, while .NET Core is open-source.

  • The .NET Framework is not modular, while .NET Core is modular and allows developers to include only the necessary components in their applications.

  • T...read more

Add your answer

Q98. How does YOLO algorithm works?

Ans.

YOLO (You Only Look Once) algorithm is a real-time object detection system that processes images in a single pass.

  • YOLO divides the image into a grid and predicts bounding boxes and probabilities for each grid cell.

  • It uses a single neural network to predict multiple bounding boxes and class probabilities simultaneously.

  • YOLO is known for its speed and accuracy in object detection tasks.

  • Example: YOLO can detect objects like cars, people, and animals in images or videos.

Add your answer

Q99. What is data binding?

Ans.

Data binding is a technique that connects UI elements to data sources, enabling automatic data synchronization.

  • Two types: One-way binding (UI updates from data) and two-way binding (data updates from UI).

  • Example of one-way binding: Displaying user names from a database in a list.

  • Example of two-way binding: A form where user input updates the underlying data model in real-time.

  • Commonly used in frameworks like Angular, React, and Vue.js for efficient UI development.

Add your answer

Q100. What is HSIT?

Ans.

HSIT stands for Hardware and Software Integration Testing.

  • HSIT is a type of testing that verifies the compatibility and functionality of hardware and software components.

  • It is usually performed after unit testing and before system testing.

  • HSIT can help identify any issues with the integration of hardware and software, such as driver conflicts or compatibility issues.

  • Examples of HSIT include testing the compatibility of a new graphics card with existing software or testing the...read more

Add your answer
1
2
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Bottomline

based on 247 interviews
5 Interview rounds
Technical Round - 1
Technical Round - 2
HR Round - 1
HR Round - 2
HR Round - 3
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top System Engineer Interview Questions from Similar Companies

3.9
 • 17 Interview Questions
3.6
 • 13 Interview Questions
3.5
 • 13 Interview Questions
3.8
 • 13 Interview Questions
3.9
 • 10 Interview Questions
3.6
 • 10 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter