Add office photos
Engaged Employer

TCS

3.7
based on 84.1k Reviews
Filter interviews by

100+ Amit Jindal Infraways Indore Interview Questions and Answers

Updated 12 Oct 2024
Popular Designations
Q1. Who Won the Election???

Elections are going on, and there are two candidates A and B, contesting with each other. There is a queue of voters and in this queue, some of them are supporters of A and some of them a...read more

View 11 more answers
Q2. Mirror String

You are given a string S containing only uppercase English characters. Find whether S is the same as its reflection in the mirror.

For Example, S = “AMAMA” is the same as its reflection in the mirr...read more

View 2 more answers
Q3. Cycle Detection in a Singly Linked List

You have given a Singly Linked List of integers, determine if it forms a cycle or not.

A cycle occurs when a node's next points back to a previous node in the list. The li...read more

View 3 more answers
Q4. Twin Pairs

Bob always bragged about his smartness. To test this, Alice gave him an

array ‘A’ of size ‘N’ and asked him to find the number of twin pairs in that array.

A twin pair can be defined as a pair of inde...read more

View 2 more answers
Discover Amit Jindal Infraways Indore interview dos and don'ts from real experiences
Q5. Binary Pattern

You have been given an input integer 'N'. Your task is to print the following binary pattern for it.

Example

Pattern for 'N' = 4 1111 000 11 0 

The first line contains 'N' 1s. The next line contai...read more

Add your answer
Q6. Remove Duplicates

Ninja is playing with numbers but hates when he gets duplicate numbers. Ninja is provided an array, and he wants to remove all duplicate elements and return the array, but he has to maintain th...read more

View 2 more answers
Are these interview questions helpful?
Q7. Number of Pairs with Given Sum

You have been given an integer array/list(arr) and a number 'Sum'. Find and return the total number of pairs in the array/list which when added, results equal to the 'Sum'.

Note:
G...read more
View 3 more answers
Q8. Loot Houses

A thief wants to loot houses. He knows the amount of money in each house. He cannot loot two consecutive houses. Find the maximum amount of money he can loot.

Input Format :
The first line of input c...read more
View 3 more answers
Share interview questions and help millions of jobseekers 🌟
Q9. 0 1 Knapsack

A thief is robbing a store and can carry a maximal weight of W into his knapsack. There are N items and the ith item weighs wi and is of value vi. Considering the constraints of the maximum weight t...read more

View 2 more answers
Q10. Game In Space

Ninja is in space with his super spaceship having unlimited fuel. Ninja initially has a health level ‘H’ and his spaceship has an armour ‘A’. He decides to play a game, where at any instant he can ...read more

View 3 more answers
Q11. Number Of Vehicles

There is a person named Bob who is the mayor of a state. He wants to find the maximise number of vehicles that can be registered in his state.

A vehicle normally has a registration number like...read more

Add your answer
Q12. Minimum Cost to Connect All Points

You are given an array, ‘COORDINATES’ that represents the integer coordinates of some points on a 2D plane. Your task is to find the minimum cost to make all the points connect...read more

View 2 more answers
Q13. Pair Sum

You are given an integer array 'ARR' of size 'N' and an integer 'S'. Your task is to return the list of all pairs of elements such that each sum of elements of each pair equals 'S'.

Note:

Each pair shou...read more
View 3 more answers
Q14. Maximum Profit

Ninja is a poor but an intelligent boy. He has a rod of length ‘N’ units. He wants to earn maximum money by selling this rod in the market. So he cuts the rod into different sizes and each size ha...read more

Add your answer

Q15. What is the difference b/w Procedural Programming and OOP Concept? What are the problems with C in this context?

Ans.

Procedural programming focuses on procedures and functions, while OOP emphasizes objects and classes.

  • Procedural programming uses a top-down approach, while OOP uses a bottom-up approach.

  • In procedural programming, data and functions are separate, while in OOP, they are encapsulated within objects.

  • Procedural programming is more suitable for small-scale programs, while OOP is better for large-scale projects.

  • C is a procedural programming language, lacking the features of OOP like...read more

Add your answer

Q16. Explain Difference b/w Constructor and Method also write the code which can describe the difference b/w the two?

Ans.

A constructor is a special method used to initialize an object, while a method is a function that performs a specific task.

  • Constructors are called automatically when an object is created, while methods need to be called explicitly.

  • Constructors have the same name as the class, while methods can have any valid name.

  • Constructors do not have a return type, while methods can have a return type.

  • Constructors are used to set initial values of instance variables, while methods are use...read more

Add your answer
Q17. DBMS Question

What is meant by an entity-relationship (E-R) model? Explain the terms Entity, Entity Type, and Entity Set in DBMS.

Add your answer

Q18. Model an upsetting(metal forming) operation. Explain the process parameters and how would you relate them

Ans.

Modeling an upsetting operation involves understanding process parameters and their relationships.

  • Upsetting is a metal forming process that involves compressing a metal workpiece to reduce its length and increase its diameter.

  • Process parameters include temperature, pressure, and deformation rate.

  • Temperature affects the material's flow stress and ductility, while pressure and deformation rate affect the material's strain hardening behavior.

  • The relationship between these parame...read more

Add your answer

Q19. What do you know about Protocols? Explain Different types of Protocols?

Ans.

Protocols are a set of rules that govern the communication between devices or systems.

  • Protocols define the format, timing, sequencing, and error checking of messages exchanged between devices.

  • Different types of protocols include network protocols (TCP/IP, HTTP, FTP), communication protocols (RS-232, USB, Bluetooth), and application protocols (SMTP, POP3, IMAP).

  • Network protocols govern the communication between devices on a network, while communication protocols govern the com...read more

Add your answer
Q20. OOPS Question

What are the various types of inheritance?

Add your answer
Q21. OOPS Question

What are the various types of constructors in C++?

Add your answer
Q22. Aptitude Question

simple question based on how many different permutation of a string is allowed when there are cases involved like 1st character is fixed or 1&2 or 12&3 characters are fixed like this

Add your answer

Q23. What is the difference b/w assignment and initialization?

Ans.

Assignment is assigning a value to a variable, while initialization is declaring and assigning a value to a variable.

  • Assignment changes the value of an existing variable, while initialization creates a new variable and assigns a value to it.

  • Initialization is done only once, while assignment can be done multiple times.

  • Example of initialization: int x = 5; Example of assignment: x = 10;

  • Initialization can also be done using constructors in object-oriented programming.

  • In C++, uni...read more

Add your answer
Q24. OOPS Question

How does C++ support Polymorphism?

Add your answer

Q25. Write a code to describe the difference b/w normal function calling and stored procedure invocation?

Ans.

A normal function is called directly in the code, while a stored procedure is invoked using a database query.

  • Normal function calling is done within the program code, while stored procedure invocation is done through a database query.

  • Normal functions are defined and called within the same programming language, while stored procedures are defined and invoked within a database management system.

  • Normal function calling is synchronous, while stored procedure invocation can be asyn...read more

Add your answer

Q26. What do you mean by experience certainty?

Ans.

Experience certainty refers to the level of confidence and assurance gained through repeated exposure to a particular task or situation.

  • Experience certainty is achieved through repetition and familiarity.

  • It allows individuals to perform tasks with greater ease and efficiency.

  • For example, a pilot who has flown the same route multiple times will have a higher level of experience certainty compared to a pilot who is flying the route for the first time.

  • Experience certainty can al...read more

Add your answer
Q27. Technical Questions

What tech stack I used and why?
What problem does your project solve?

Add your answer

Q28. What is the smallest and the biggest real time project of Java according to you? What is Big Data? If you have to perform actions on 2 billion entry at a time. What would you do and which languages and technolo...

read more
Ans.

The smallest real-time project in Java could be a simple chat application, while the biggest could be a complex financial trading system.

  • Smallest real-time project in Java: Chat application

  • Biggest real-time project in Java: Financial trading system

  • Big Data refers to large and complex data sets that cannot be easily processed using traditional data processing applications.

  • For performing actions on 2 billion entries, technologies like Hadoop, Spark, and languages like Java or S...read more

Add your answer

Q29. What are the advantages of Stored Procedures?

Ans.

Stored procedures offer advantages such as improved performance, security, and code reusability.

  • Stored procedures can reduce network traffic by executing multiple SQL statements at once.

  • They can also improve performance by pre-compiling SQL statements.

  • Stored procedures can enhance security by allowing access to only specific procedures rather than entire tables.

  • They promote code reusability by allowing multiple applications to use the same stored procedure.

  • Examples include pr...read more

Add your answer

Q30. Why did you learn PHP, if JSP is more secure?

Ans.

PHP was chosen for its versatility, large community support, and ease of use.

  • PHP is a widely used scripting language with a large community of developers and extensive documentation.

  • It is known for its versatility and ability to integrate with various databases and web servers.

  • PHP is also relatively easy to learn and has a low learning curve compared to other languages like JSP.

  • While JSP may be considered more secure, PHP can still be used to build secure applications with pr...read more

Add your answer

Q31. What do you know about File System in C++?

Ans.

File System in C++ is used for managing files and directories, providing functions for file input/output operations.

  • C++ provides the library for file input/output operations.

  • File streams can be used to read from and write to files.

  • Common file operations include opening, closing, reading, and writing files.

  • File streams can handle different file types such as text files and binary files.

  • File system functions like file existence check, file deletion, and file renaming are avail...read more

Add your answer

Q32. What is the difference b/w thread and process?

Ans.

A thread is a lightweight unit of execution within a process, while a process is an instance of a program in execution.

  • A process has its own memory space, while threads share the same memory space within a process.

  • Processes are independent and isolated from each other, while threads share resources and can communicate with each other more easily.

  • Creating a new process is more resource-intensive than creating a new thread.

  • Threads are scheduled by the operating system, while pr...read more

Add your answer

Q33. What is operating system? Difference between compiler and interpretor? One byte is how many bit? What is Machine language? What is the function of assembler ? What are the different types of operating system? W...

read more
Ans.

Operating system is a software that manages computer hardware and software resources.

  • Compiler translates high-level language code to machine code while interpreter executes code line by line.

  • One byte is equal to 8 bits.

  • Machine language is a low-level programming language consisting of binary code.

  • Assembler converts assembly language code to machine code.

  • Types of operating system include Windows, macOS, Linux, and Unix.

  • Unix is a multi-user, multi-tasking operating system devel...read more

Add your answer

Q34. How many annotations in TestNG and brief all the annotations.

Ans.

TestNG has 8 annotations including @Test, @BeforeSuite, @AfterSuite, @BeforeTest, @AfterTest, @BeforeClass, @AfterClass, @BeforeMethod, @AfterMethod.

  • 1. @Test - Marks a method as a test method.

  • 2. @BeforeSuite - Executed before the Test Suite.

  • 3. @AfterSuite - Executed after the Test Suite.

  • 4. @BeforeTest - Executed before the Test.

  • 5. @AfterTest - Executed after the Test.

  • 6. @BeforeClass - Executed before the first test method in the current class.

  • 7. @AfterClass - Executed after a...read more

Add your answer
Q35. DBMS Question

Explain the difference between the DELETE and TRUNCATE command in a DBMS

Add your answer
Q36. Aptitude Questions

There were questions on time/distance, number system, work and time.

There were questions on Reading Comprehension.

Add your answer

Q37. Do you Know JSP? What is JSP? Its Advantages?

Ans.

JSP is a Java-based technology used for creating dynamic web pages. It allows embedding Java code within HTML pages.

  • JSP stands for JavaServer Pages.

  • It is a technology used for developing web applications.

  • JSP allows embedding Java code within HTML pages.

  • It provides a simplified way to create dynamic web content.

  • JSP files are compiled into servlets and executed on the server.

  • Advantages of JSP include easy integration with Java code, reusable components, and separation of presen...read more

Add your answer

Q38. Do you know about TCS bond agreement?

Ans.

TCS bond agreement is a contract signed by employees to work for a certain period of time with the company.

  • TCS bond agreement is a legal contract between TCS and its employees.

  • Employees sign the bond agreement to work for a certain period of time with the company.

  • The bond period can range from 1 to 2 years depending on the role and level of the employee.

  • If an employee wishes to leave the company before the bond period ends, they are required to pay a certain amount as compens...read more

Add your answer

Q39. Do you know what stored procedures are?

Ans.

Stored procedures are pre-written SQL codes that can be saved and reused.

  • Stored procedures can improve database performance by reducing network traffic.

  • They can be used to enforce business rules and security measures.

  • They can be parameterized to accept input values and return output values.

  • Examples include procedures for inserting, updating, and deleting data.

  • They can also be used for complex operations such as data aggregation and reporting.

Add your answer

Q40. Explain Difference b/w Function and Stored Procedure?

Ans.

Functions return a value while stored procedures do not.

  • Functions are used to perform a specific task and return a value to the caller.

  • Stored procedures are used to execute a set of statements and do not return a value.

  • Functions can be used in SELECT, WHERE, and HAVING clauses.

  • Stored procedures can be used to modify data, but functions cannot.

  • Functions can be called from within a stored procedure.

Add your answer

Q41. What is Page Object Model and page factory

Ans.

Page Object Model is a design pattern in test automation that represents web pages as objects, while Page Factory is a way to initialize elements in Page Object Model.

  • Page Object Model is a design pattern used in test automation to represent web pages as objects

  • It helps in creating reusable code and reduces code duplication

  • Page Factory is a concept in Selenium WebDriver that helps in initializing elements in Page Object Model

  • It uses @FindBy annotation to locate elements on a ...read more

Add your answer

Q42. What do you understand by Deadlocks?

Ans.

Deadlocks occur when two or more processes are unable to proceed because each is waiting for the other to finish.

  • Deadlocks happen when two or more processes are blocked and unable to proceed

  • Each process is waiting for a resource that is being held by another process

  • Deadlocks can be prevented by using techniques like resource allocation graphs and banker's algorithm

  • Examples of deadlocks include the dining philosophers problem and the traffic deadlock problem

Add your answer

Q43. What are types of File System in OS?

Ans.

Types of file systems in OS include FAT, NTFS, HFS+, ext2/3/4, and APFS.

  • FAT (File Allocation Table) is a simple file system used by older versions of Windows.

  • NTFS (New Technology File System) is a more advanced file system used by newer versions of Windows.

  • HFS+ (Hierarchical File System Plus) is used by Apple's macOS.

  • ext2/3/4 are file systems used by Linux.

  • APFS (Apple File System) is a newer file system used by Apple's macOS and iOS devices.

Add your answer

Q44. What is python? Why we use it. Is it case sensitive?

Ans.

Python is a high-level, interpreted programming language used for web development, data analysis, and artificial intelligence.

  • Python is easy to learn and has a simple syntax.

  • It has a large standard library with many pre-built modules.

  • Python is used for web development with frameworks like Django and Flask.

  • It is also used for data analysis with libraries like NumPy and Pandas.

  • Python is case sensitive.

  • It is a popular language for artificial intelligence and machine learning.

  • Pyt...read more

Add your answer

Q45. Can you learn coding, if it is needed?

Ans.

Yes, I am willing to learn coding if it is needed.

  • I have some basic knowledge of coding and am willing to improve my skills.

  • I am a quick learner and can adapt to new technologies easily.

  • I am open to taking courses or attending training sessions to improve my coding skills.

  • Learning coding will also help me better understand the systems I work with.

  • For example, I have experience with Python and SQL, and can learn other languages as needed.

Add your answer

Q46. What are the properties of Constructor?

Ans.

Constructor is a special method used to initialize objects in a class.

  • Constructors have the same name as the class they belong to.

  • They are called automatically when an object is created.

  • They can take parameters to initialize the object's properties.

  • They do not have a return type.

  • Multiple constructors can be defined with different parameters.

  • Example: public class Car { public Car(String make, String model) { ... } }

Add your answer

Q47. Write a code to allocate the memory to object?

Ans.

Code to allocate memory to an object

  • Use the 'new' keyword in C++ to allocate memory to an object

  • Use 'malloc' function in C to allocate memory to an object

  • In Java, memory is automatically allocated to an object using 'new' keyword

  • In Python, memory is automatically allocated to an object when it is created

Add your answer

Q48. what is oop? what is difference between python and c programming? write a program on reverse a string?

Ans.

OOP stands for Object-Oriented Programming. Python and C differ in syntax, memory management, and application areas. A program to reverse a string can be written using loops or slicing.

  • OOP is a programming paradigm that focuses on objects and their interactions.

  • Python is a high-level language with dynamic typing and automatic memory management, while C is a low-level language with static typing and manual memory management.

  • To reverse a string using loops, iterate through the ...read more

Add your answer

Q49. functions of basic electronic componenents like R L C

Ans.

R, L, and C are basic electronic components used in circuits for resistance, inductance, and capacitance respectively.

  • Resistors (R) limit current flow and reduce voltage

  • Inductors (L) store energy in a magnetic field and resist changes in current

  • Capacitors (C) store energy in an electric field and pass AC signals while blocking DC signals

  • These components are used in various circuits such as filters, oscillators, and amplifiers

Add your answer

Q50. What do you mean by Paging?

Ans.

Paging is a memory management technique used by operating systems to manage memory usage.

  • Paging divides memory into fixed-size pages.

  • Pages are stored in physical memory or on disk.

  • When a process needs a page, it is loaded into physical memory.

  • If there is no space in physical memory, a page is swapped out to disk.

  • Paging allows for efficient use of memory and prevents processes from accessing memory they shouldn't.

  • Examples of operating systems that use paging include Windows, L...read more

Add your answer

Q51. How to write Webdriver with in your code

Ans.

Webdriver can be written in code using Selenium WebDriver library for automating web applications.

  • Import the necessary Selenium WebDriver library in your code

  • Create a WebDriver instance for the desired browser (e.g. Chrome, Firefox)

  • Use WebDriver methods to interact with elements on the web page (e.g. findElement, click, sendKeys)

  • Write test cases using WebDriver commands to automate testing scenarios

Add your answer

Q52. what is the potential diffrence acc to u

Ans.

Potential difference is the difference in electric potential between two points in an electric field.

  • Potential difference is measured in volts (V)

  • It is the work done per unit charge to move a charge from one point to another

  • It is the driving force that causes current to flow in a circuit

  • Potential difference can be calculated using Ohm's law: V = IR

  • A battery creates a potential difference between its terminals to power a circuit

Add your answer

Q53. what is the function of a switch

Ans.

A switch is a networking device that connects devices together on a local area network (LAN) and forwards data packets between them.

  • Switches operate at the data link layer of the OSI model.

  • They use MAC addresses to forward data to the correct destination.

  • Switches can improve network performance by reducing network congestion and collisions.

  • Examples of switches include Ethernet switches, LAN switches, and network switches.

Add your answer

Q54. primary key can be a null or not?

Ans.

No, primary key cannot be null.

  • Primary key uniquely identifies a record in a table.

  • Null values are not unique and can cause data integrity issues.

  • Primary key constraint ensures that the value is not null.

  • However, primary key can have a default value.

View 1 answer

Q55. What is oops ? What is ORM in python? Multiple Inheritance in java vs python?

Ans.

OOPs is a programming paradigm that uses objects to represent real-world entities. ORM is a technique to map objects to relational databases.

  • OOPs stands for Object-Oriented Programming.

  • It is based on the concept of objects, which can contain data and code.

  • In OOPs, objects interact with each other to perform tasks.

  • ORM stands for Object-Relational Mapping.

  • It is a technique to map objects to relational databases.

  • ORM allows developers to work with objects instead of SQL statement...read more

Add your answer

Q56. Can you explain encapsulation?

Ans.

Encapsulation is the process of hiding internal details and providing a public interface for accessing and manipulating data.

  • Encapsulation is a fundamental concept in object-oriented programming.

  • It allows for data abstraction and information hiding.

  • Encapsulation helps in achieving data integrity and security.

  • It promotes code reusability and modularity.

  • Example: A class in Java with private variables and public methods.

View 1 answer

Q57. What is normalization?

Ans.

Normalization is the process of organizing data in a database to eliminate redundancy and improve data integrity.

  • Normalization helps in reducing data redundancy by breaking down a large table into smaller, more manageable tables.

  • It ensures that each piece of data is stored in only one place, reducing the chances of inconsistencies.

  • Normalization follows a set of rules called normal forms, such as First Normal Form (1NF), Second Normal Form (2NF), etc.

  • Normalization improves dat...read more

View 1 answer

Q58. what is LAN MAN WAN PAN ETC

Ans.

LAN, MAN, WAN, PAN are types of computer networks that differ in their geographical coverage and purpose.

  • LAN (Local Area Network) is a network that covers a small area like a home, office, or building.

  • MAN (Metropolitan Area Network) is a network that covers a larger area like a city or town.

  • WAN (Wide Area Network) is a network that covers a large geographical area like a country or the whole world.

  • PAN (Personal Area Network) is a network that connects devices within a person'...read more

Add your answer

Q59. Do you Know Phantom Deadlocks?

Ans.

Yes, phantom deadlocks are a type of deadlock that occur due to incorrect lock ordering.

  • Phantom deadlocks occur when multiple processes or threads attempt to acquire locks in a different order.

  • This can lead to a situation where each process is waiting for a lock held by another process, resulting in a deadlock.

  • Phantom deadlocks can be difficult to detect and reproduce as they are intermittent and depend on the timing of lock acquisitions.

  • To prevent phantom deadlocks, it is im...read more

Add your answer

Q60. What are cookies in PHP?

Ans.

Cookies in PHP are small text files that are stored on the user's computer to track and store information about the user's activities on a website.

  • Cookies are used to remember user preferences and login information.

  • They can be set, retrieved, and deleted using PHP's setcookie(), $_COOKIE, and setcookie() functions respectively.

  • Cookies can have an expiration date and can be set to be accessible only over a secure connection.

  • They are commonly used for tracking user behavior, pe...read more

Add your answer

Q61. How to reverse string, array. What is args in Java.

Ans.

To reverse a string or array in Java, use StringBuilder or Collections.reverse. 'args' in Java is an array of strings passed as command line arguments.

  • Use StringBuilder to reverse a string: StringBuilder str = new StringBuilder('hello'); str.reverse();

  • Use Collections.reverse to reverse an array: List list = Arrays.asList('apple', 'banana', 'cherry'); Collections.reverse(list);

  • 'args' in Java is an array of strings used to pass command line arguments to a Java program.

Add your answer

Q62. write a program for division nd multiplication inn 8085 processor

Ans.

Program for division and multiplication in 8085 processor.

  • For multiplication, use MUL instruction with 8-bit operand.

  • For division, use DIV instruction with 8-bit dividend and 16-bit divisor.

  • Store the result in appropriate registers or memory locations.

  • Example: To multiply two numbers in registers B and C, use MUL C instruction.

  • Example: To divide two numbers in registers A and B, use DIV B instruction.

Add your answer

Q63. What are Constructors?

Ans.

Constructors are special methods used to initialize objects in a class.

  • Constructors have the same name as the class they belong to.

  • They are called automatically when an object is created.

  • They can be used to set default values for object properties.

  • Constructors can be overloaded to accept different parameters.

  • Example: public class Car { public Car() { //constructor code here } }

Add your answer

Q64. explain the concepts of a router

Ans.

A router is a networking device that forwards data packets between computer networks.

  • A router operates at the network layer of the OSI model.

  • It uses routing tables to determine the best path for data packets to reach their destination.

  • Routers can connect multiple networks together, such as LANs and WANs.

  • They provide network address translation (NAT) to allow multiple devices to share a single public IP address.

  • Routers can also provide firewall functionality to protect the net...read more

Add your answer

Q65. Differences between Object Oriented and Procedure oriented programming languages

Ans.

Object-oriented programming focuses on objects and their interactions, while procedure-oriented programming focuses on procedures and functions.

  • OOP is based on the concept of classes and objects, while POP is based on procedures and functions.

  • OOP supports encapsulation, inheritance, and polymorphism, while POP does not.

  • OOP is more suitable for large-scale projects, while POP is more suitable for small-scale projects.

  • Examples of OOP languages include Java, C++, and Python, whi...read more

Add your answer

Q66. what are static & dynamic protocols

Ans.

Static protocols are fixed and do not change, while dynamic protocols can adapt to changing network conditions.

  • Static protocols are typically used in simple networks with predictable traffic patterns.

  • Dynamic protocols are used in complex networks with varying traffic patterns.

  • Examples of static protocols include ARP and RARP.

  • Examples of dynamic protocols include OSPF and BGP.

Add your answer

Q67. 3. Find the sum of all numbers from a list except self

Ans.

Sum all numbers in a list except self

  • Iterate through the list and add all numbers except the current one

  • Use a loop or built-in functions like sum() and list comprehension

Add your answer

Q68. Explain characteristics of DBMS?

Ans.

DBMS is a software system that manages databases, providing features like data storage, retrieval, and manipulation.

  • DBMS stands for Database Management System.

  • It provides a structured way to store and organize data.

  • DBMS allows multiple users to access and manipulate the data simultaneously.

  • It ensures data integrity and security through various mechanisms.

  • DBMS provides a query language to retrieve and manipulate data, such as SQL.

  • Examples of popular DBMS include Oracle, MySQL,...read more

Add your answer

Q69. What is the difference between DBMS and NoSQL?

Ans.

DBMS is a traditional relational database management system, while NoSQL is a non-relational database management system.

  • DBMS uses structured query language (SQL) for querying and managing data, while NoSQL databases use different query languages or APIs.

  • DBMS is typically used for structured data with predefined schemas, while NoSQL is more flexible and can handle unstructured or semi-structured data.

  • DBMS is ACID-compliant (Atomicity, Consistency, Isolation, Durability), ensur...read more

Add your answer

Q70. Problem arrange 3 numbers in ascending order. Just write the logic

Ans.

Logic to arrange 3 numbers in ascending order.

  • Compare first two numbers and swap if necessary

  • Compare second and third numbers and swap if necessary

  • Repeat until no more swaps are needed

Add your answer

Q71. diff betn passive & active components

Ans.

Passive components do not require an external power source, while active components do.

  • Passive components include resistors, capacitors, and inductors.

  • Active components include transistors, diodes, and integrated circuits.

  • Passive components do not amplify signals, while active components do.

  • Passive components are used to control the flow of electricity, while active components are used to create and amplify signals.

Add your answer

Q72. Why did you create project in machine learning

Ans.

I created a project in machine learning to improve the accuracy of a recommendation system.

  • To enhance the user experience by providing personalized recommendations

  • To optimize the efficiency of the system by automating the recommendation process

  • To leverage the power of data analysis and pattern recognition in making accurate predictions

  • To explore the potential of machine learning algorithms in solving real-world problems

  • To stay updated with the latest advancements in the field...read more

Add your answer

Q73. What is cloud computing and explain?

Ans.

Cloud computing is the delivery of computing services over the internet, allowing users to access and store data and applications remotely.

  • Cloud computing allows users to access data and applications from any device with an internet connection.

  • It eliminates the need for physical hardware and on-site data centers.

  • Examples of cloud computing services include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.

Add your answer

Q74. Do you know coding?

Ans.

Yes, I know coding.

  • I am proficient in programming languages such as Java, Python, and C++.

  • I have experience in developing and maintaining software applications.

  • I am familiar with software development methodologies such as Agile and Waterfall.

Add your answer

Q75. How do you handle stack over flow?

Ans.

Handle stack overflow by optimizing code, using dynamic memory allocation, and implementing error handling.

  • Optimize code to reduce memory usage and prevent stack overflow.

  • Use dynamic memory allocation for large data structures.

  • Implement error handling to gracefully handle stack overflow situations.

Add your answer

Q76. Difference between heap and stack memory?

Ans.

Heap memory is used for dynamic memory allocation, while stack memory is used for static memory allocation.

  • Heap memory is allocated at runtime and can be accessed randomly, while stack memory is allocated at compile time and is accessed in a LIFO manner.

  • Heap memory is managed by the programmer, while stack memory is managed by the compiler.

  • Heap memory is typically used for storing objects and data structures, while stack memory is used for storing local variables and function...read more

Add your answer

Q77. what is differne betwwen if else and while loop

Ans.

if-else is a conditional statement while while loop is a repetitive statement.

  • if-else statement is used to execute a block of code based on a condition

  • while loop is used to execute a block of code repeatedly as long as a condition is true

  • if-else statement is used for decision making while while loop is used for iteration

  • if-else statement can have multiple conditions while while loop has only one condition

  • Example: if(age > 18){ console.log('You are an adult'); } else { console...read more

Add your answer

Q78. Explain OOPS concepts. Explain projects you have done.

Ans.

OOPS concepts include inheritance, encapsulation, polymorphism, and abstraction. Projects include developing a CRM system and a mobile app.

  • Inheritance: Allows a class to inherit properties and behavior from another class. Example: Parent class 'Vehicle' and child class 'Car'.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit. Example: Class 'Employee' with private variables and public methods.

  • Polymorphism: Ability to present the same interfac...read more

Add your answer

Q79. Circuit Diagram

Ans.

A circuit diagram is a graphical representation of an electrical circuit.

  • It shows the components and connections in the circuit

  • Symbols are used to represent each component

  • Lines represent the wires connecting the components

  • It helps in understanding the circuit's function and troubleshooting

  • Examples include diagrams for simple circuits like a flashlight or complex circuits like a computer motherboard

Add your answer

Q80. What is singleton class explain with example

Ans.

A singleton class is a class that can only have one instance created throughout the entire application.

  • Singleton classes are used when we want to restrict the number of instances of a class to one.

  • They are often used in scenarios where we need to maintain a single point of control or coordination.

  • For example, a logger class can be implemented as a singleton class to ensure that only one instance of the logger is created and used throughout the application.

Add your answer

Q81. what is subnetting

Ans.

Subnetting is the process of dividing a network into smaller subnetworks, called subnets, to improve network efficiency and security.

  • Subnetting allows for better utilization of IP addresses by dividing a network into smaller segments.

  • It helps in improving network performance by reducing network congestion.

  • Subnetting enhances network security by isolating different departments or devices within a network.

  • It enables efficient routing and reduces broadcast traffic.

  • Example: A net...read more

Add your answer

Q82. what are protocols

Ans.

Protocols are a set of rules and guidelines that govern the communication between devices or systems.

  • Protocols define the format and order of messages exchanged between devices.

  • They ensure reliable and efficient communication by specifying error detection and correction mechanisms.

  • Examples of protocols include TCP/IP, HTTP, SMTP, and FTP.

  • Protocols can operate at different layers of the network stack, such as the application layer, transport layer, or network layer.

Add your answer

Q83. How to connect mongoDB in python

Ans.

Use pymongo library to connect mongoDB in python

  • Install pymongo library using pip

  • Import pymongo in your python script

  • Create a MongoClient object with the connection string

  • Access the database and collection using the MongoClient object

Add your answer

Q84. 2. What are decorators in Python

Ans.

Decorators are functions that modify the behavior of other functions without changing their source code.

  • Decorators are denoted by the '@' symbol followed by the decorator function name

  • They can be used to add functionality to a function, such as logging or timing

  • They can also be used to modify the behavior of a function, such as adding caching or authentication

  • Decorators can be stacked on top of each other to apply multiple modifications to a function

  • Example: @staticmethod, @c...read more

Add your answer

Q85. write code for polymorphism?

Ans.

Polymorphism is achieved through method overriding and method overloading.

  • Polymorphism allows objects of different classes to be treated as if they are objects of the same class.

  • Method overriding is when a subclass provides its own implementation of a method that is already defined in its superclass.

  • Method overloading is when a class has multiple methods with the same name but different parameters.

  • Polymorphism can be achieved through interfaces as well.

  • Example: Animal class w...read more

Add your answer

Q86. What is interfaces nad abstract ?

Ans.

Interfaces and abstract are programming concepts used to achieve abstraction and modularity in code.

  • Interfaces define a set of methods that a class must implement.

  • Abstract classes are classes that cannot be instantiated and can have both abstract and non-abstract methods.

  • Both concepts are used to achieve abstraction and modularity in code.

  • Interfaces are used to define contracts between classes, while abstract classes are used to provide a base implementation for subclasses.

  • Ja...read more

Add your answer

Q87. malloc and calloc? what is union? code for factorial

Ans.

malloc and calloc are memory allocation functions in C. Union is a data type that allows storing different data types in the same memory location. Factorial is a mathematical operation.

  • malloc() allocates a block of memory of specified size and returns a pointer to the first byte of the block.

  • calloc() allocates a block of memory for an array of elements, initializes them to zero, and returns a pointer to the first byte of the block.

  • Union is a data type that allows storing diff...read more

Add your answer

Q88. tell me about query optimization?

Ans.

Query optimization is the process of improving the efficiency and performance of database queries.

  • Identifying slow queries and analyzing their execution plans

  • Creating appropriate indexes on tables to speed up query execution

  • Rewriting queries to use efficient joins and filters

  • Using query hints or optimizer hints to guide the query optimizer

  • Regularly monitoring and tuning the database for optimal performance

Add your answer

Q89. What are the DML commands you have used

Ans.

DML commands I have used include INSERT, UPDATE, DELETE in SQL databases.

  • INSERT: Used to add new records to a table

  • UPDATE: Used to modify existing records in a table

  • DELETE: Used to remove records from a table

Add your answer

Q90. String reversal without out using any method

Ans.

Reverse a string without using any built-in methods

  • Create a new array to store the reversed string

  • Iterate through the original string from end to start and add each character to the new array

  • Join the characters in the new array to form the reversed string

Add your answer

Q91. What are the OOPs 4 pillars ?

Ans.

The 4 pillars of OOPs are Inheritance, Encapsulation, Abstraction, and Polymorphism.

  • Inheritance allows a class to inherit properties and behavior from another class.

  • Encapsulation restricts access to certain components within a class, protecting the data.

  • Abstraction hides complex implementation details and only shows the necessary features.

  • Polymorphism allows objects to be treated as instances of their parent class or their own class.

Add your answer

Q92. Model a milling process

Ans.

A milling process involves removing material from a workpiece using a rotating cutting tool.

  • Select appropriate cutting tool and workpiece material

  • Determine the cutting speed, feed rate, and depth of cut

  • Set up the milling machine and secure the workpiece

  • Start the machine and monitor the process for any issues

  • Inspect the finished product for accuracy and quality

Add your answer

Q93. Write a paragraph on

Ans.

A system engineer is responsible for designing, implementing, and maintaining computer systems and networks.

  • System engineers design and implement computer systems and networks

  • They ensure the systems are secure and reliable

  • They troubleshoot and resolve technical issues

  • They work with other IT professionals to ensure the systems meet business needs

  • Examples of systems they may work on include servers, databases, and cloud computing platforms

Add your answer

Q94. Convert Binary to Octal

Ans.

Binary to Octal conversion involves grouping binary digits into sets of three and then converting each set to its corresponding octal digit.

  • Group binary digits into sets of three starting from the rightmost digit

  • If the leftmost set has less than three digits, add zeros to the left

  • Convert each set of three binary digits to its corresponding octal digit

  • Combine all the octal digits to get the final octal number

Add your answer

Q95. How to install os on server

Ans.

To install an OS on a server, you need to boot from the installation media and follow the on-screen instructions.

  • Insert the installation media (such as a USB drive or DVD) into the server

  • Boot the server from the installation media

  • Follow the on-screen instructions to select the OS version, partition the disk, and complete the installation process

Add your answer

Q96. Explain DBMS?

Ans.

DBMS stands for Database Management System. It is a software that manages and organizes data in a structured manner.

  • DBMS is a software system that allows users to create, retrieve, update, and manage databases.

  • It provides an interface for users to interact with the database and perform various operations.

  • DBMS ensures data integrity, security, and consistency.

  • It supports multiple users accessing the database simultaneously.

  • Examples of popular DBMS include Oracle, MySQL, SQL Se...read more

Add your answer

Q97. Types of joins?

Ans.

Types of joins in SQL include inner join, left join, right join, and full outer join.

  • Inner join returns only the matching rows from both tables.

  • Left join returns all rows from the left table and the matching rows from the right table.

  • Right join returns all rows from the right table and the matching rows from the left table.

  • Full outer join returns all rows from both tables, including unmatched rows.

View 1 answer

Q98. file handle in c?

Ans.

A file handle in C is a pointer that represents a file stream, allowing operations like reading and writing.

  • A file handle is typically obtained by opening a file using functions like fopen()

  • File handles are used to perform operations like reading, writing, and closing files

  • They can be passed as arguments to functions like fread(), fwrite(), and fclose()

  • File handles can be used to check for errors during file operations

View 1 answer

Q99. what is module.exports

Ans.

module.exports is a special object in Node.js that allows you to export functions, objects, or primitive values from a module.

  • Used to export functions, objects, or primitive values from a module

  • Can be assigned directly to a function, object, or value to be exported

  • Commonly used in Node.js to create reusable modules

Add your answer

Q100. what is page object model

Ans.

Page Object Model is a design pattern used in test automation to create an object repository for web elements on a web page.

  • It helps in creating reusable and maintainable code for automated tests.

  • Each web page is represented as a class, and the elements on the page are defined as variables within the class.

  • Methods are created to perform actions on these elements, making the tests more readable and easier to maintain.

  • Page Object Model promotes code reusability and reduces code...read more

Add your answer
1
2
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Amit Jindal Infraways Indore

based on 578 interviews in the last 1 year
4 Interview rounds
Technical Round 1
Technical Round 2
HR Round 1
HR Round 2
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top System Engineer Interview Questions from Similar Companies

4.1
 • 20 Interview Questions
3.9
 • 16 Interview Questions
3.4
 • 12 Interview Questions
3.8
 • 12 Interview Questions
4.1
 • 11 Interview Questions
3.6
 • 11 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter