TCS
10+ Autoportal.com Interview Questions and Answers
Q1. How to design and event hub generated source system data consumption architecture in Azure
Design event hub generated source system data consumption architecture in Azure
Create an event hub to receive data from source system
Use Azure Stream Analytics to process and transform data
Store data in Azure Data Lake Storage or Azure Blob Storage
Use Azure Databricks or Azure HDInsight for further analysis
Consider using Azure Functions for real-time processing
Ensure proper security and access control measures are in place
Q2. What are the challenges come across with the process of classic to lighting migration ?
Challenges in classic to lighting migration process
Compatibility issues with existing hardware and software
Training employees on new system
Ensuring data migration is accurate and complete
Potential downtime during migration process
Costs associated with upgrading hardware and software
Ensuring third-party integrations are compatible with new system
Q3. Tell me about caching in enterprise application
Caching is a technique used to store frequently accessed data in memory for faster access.
Caching can improve application performance by reducing the number of requests to the database or other external systems.
Caching can be implemented at different levels such as application level, database level, and network level.
Caching strategies include time-based expiration, least recently used (LRU) eviction, and invalidation.
Examples of caching technologies include Redis, Memcached,...read more
Q4. Difference between Microservices and monolithic?
Microservices are small, independent services that work together, while monolithic is a single, large application.
Microservices are loosely coupled and can be developed and deployed independently.
Monolithic applications are tightly coupled and require a full deployment for any changes.
Microservices allow for better scalability and fault tolerance.
Monolithic applications can be simpler to develop and deploy initially.
Examples of microservices include Netflix, Amazon, and Uber....read more
Q5. The core differences between seperate access policies from different connection protocol in azure
Different connection protocols in Azure have separate access policies.
Access policies can be set for different connection protocols such as HTTP, HTTPS, FTP, etc.
Each protocol can have its own set of rules and permissions for accessing resources.
For example, HTTPS may require a higher level of authentication than HTTP.
Separate policies allow for more granular control over access to resources.
This can improve security and compliance with regulations.
Q6. How to use time travel functionality in databricks
Time travel functionality in Databricks allows users to query data at a specific point in time.
Enable time travel on a table by setting the table property 'delta.enableChangeDataFeed' to true
Use the AS OF clause in SQL queries to specify a specific point in time to query data
Time travel can be used for auditing, debugging, and recovering lost data
Example: SELECT * FROM table_name AS OF TIMESTAMP '2022-01-01 00:00:00'
Q7. What are the integration pattern salesforce
Salesforce integration patterns include point-to-point, middleware, and API-led approaches.
Point-to-point integration involves connecting two systems directly.
Middleware integration involves using a third-party software to connect systems.
API-led integration involves using APIs to connect systems in a reusable and scalable way.
Salesforce supports various integration technologies such as REST, SOAP, and Bulk APIs.
Salesforce also provides integration tools like Salesforce Conne...read more
Q8. How do you configure and handle security in transmitting data in application
Data transmission security is ensured through configuration and handling of encryption, authentication, and secure protocols.
Implement encryption algorithms like SSL/TLS to secure data transmission
Use secure protocols like HTTPS, SFTP, or SSH for transmitting sensitive data
Implement authentication mechanisms like OAuth, JWT, or certificates to verify the identity of the sender and receiver
Apply data integrity checks like digital signatures or checksums to detect tampering
Impl...read more
Q9. Explain RabbitMQ, Service Worker on browser
RabbitMQ is a message broker that enables communication between distributed systems. Service Worker is a browser API that allows background processing.
RabbitMQ is used for asynchronous messaging between applications and services
It supports multiple messaging protocols such as AMQP, MQTT, and STOMP
Service Worker allows web applications to run scripts in the background, even when the browser is closed
It can be used for tasks such as caching, push notifications, and background s...read more
Q10. Best practices to follow in application development for order management process
Best practices for order management process in application development
Use a centralized database to store order information
Implement a robust authentication and authorization system
Ensure data integrity and consistency through proper validation and error handling
Design a scalable and efficient architecture to handle high volumes of orders
Implement automated order processing and notifications
Provide a user-friendly interface for order tracking and management
Regularly monitor a...read more
More about working at TCS
Interview Process at Autoportal.com
Top Technical Architect Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month