TCS
1500+ Innovatiview India Ltd Interview Questions and Answers
Q1. How charging protocol works in electric vehicle and what is purpose of charging pin at charging inlet
Charging protocol in EVs and purpose of charging pin at inlet
Charging protocol determines how the battery is charged and how much power is delivered
Charging pin is used to connect the charging cable to the vehicle's charging inlet
Charging protocols include AC charging, DC charging, and wireless charging
Charging protocols also include different charging levels such as Level 1, Level 2, and Level 3
Purpose of charging pin is to ensure safe and reliable transfer of power from the...read more
Q2. What is basic function of firewall.
Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Firewall acts as a barrier between a trusted, secure internal network and another network, such as the Internet.
It examines each packet of data that passes through it and determines whether to allow or block the traffic based on the set of rules.
Firewalls can be hardware or software-based and can be configured to block specific types of ...read more
Q3. What is middleware in nodejs? Explain with examples.
Middleware in Node.js is a function that sits between the server and the client and performs various tasks.
Middleware functions can be used to handle requests, modify responses, and perform authentication and authorization.
Examples of middleware in Node.js include body-parser, cookie-parser, and express-session.
Middleware functions are executed in the order they are defined in the code.
Middleware can be used to handle errors and pass them to the error handling middleware.
Q4. What is Control Coupling and Data Coupling? Explain the difference between them
Control coupling and data coupling are two types of coupling in software engineering.
Control coupling occurs when one module controls the flow of another module through parameters or flags.
Data coupling occurs when two modules share data through parameters or global variables.
Control coupling is considered more tightly coupled than data coupling.
Examples of control coupling include passing a flag to a function to determine its behavior, or using a return value to control the ...read more
Q5. Explain in detail about how you configure your api w.r.t frontend.
API configuration for frontend
Define API endpoints and methods
Ensure API responses are in the correct format for frontend
Implement authentication and authorization
Optimize API performance for frontend usage
Document API usage for frontend developers
Q6. What is the difference between Router and firewall
Routers connect networks while firewalls protect networks from unauthorized access.
Routers direct traffic between networks while firewalls filter traffic based on predefined rules.
Routers operate at layer 3 of the OSI model while firewalls operate at layer 4 or higher.
Examples of routers include Cisco routers, while examples of firewalls include Fortinet firewalls.
Routers can be used to segment networks while firewalls can be used to block malicious traffic.
Routers are essent...read more
Q7. Which are the difference Routing protocols
Routing protocols are used to determine the best path for data to travel in a network.
Distance Vector protocols: RIP, IGRP, EIGRP
Link State protocols: OSPF, IS-IS
Hybrid protocols: BGP
Path Vector protocols: BGP
IGP vs EGP
Q8. Which are the BGP attributes
BGP attributes are used to determine the best path for routing traffic between networks.
BGP attributes include: AS Path, Next Hop, Local Preference, MED, Origin, and Community
AS Path is a list of autonomous systems that the route has passed through
Next Hop is the IP address of the next router on the path
Local Preference is used to indicate the preferred path for outbound traffic
MED (Multi-Exit Discriminator) is used to indicate the preferred path for inbound traffic
Origin ind...read more
Q9. Difference between SQL and NoSql database?
SQL databases are relational and use structured query language, while NoSQL databases are non-relational and use various data models.
SQL databases are based on a fixed schema, while NoSQL databases are schema-less.
SQL databases use tables to store data, while NoSQL databases use various data models like key-value, document, columnar, or graph.
SQL databases are better suited for complex queries and structured data, while NoSQL databases are more flexible and scalable for unstr...read more
Q10. 5.which is the parent class of all classes in Java?
The parent class of all classes in Java is the Object class.
All classes in Java implicitly extend the Object class.
The Object class provides basic methods such as toString(), equals(), and hashCode().
Any class can override these methods to provide custom implementations.
Example: public class MyClass extends Object { ... }
Example: Object obj = new MyClass();
Q11. How does inverter works. How is motor control
Inverter converts DC to AC. Motor control involves adjusting frequency and voltage of AC to control motor speed.
Inverter uses power electronics to convert DC to AC
Motor control involves adjusting frequency and voltage of AC to control motor speed
Frequency and voltage are adjusted using pulse width modulation (PWM)
Motor speed can be controlled by adjusting the duty cycle of PWM signal
Examples of motor control techniques include scalar control and vector control
Q12. what are the difference between abstract class and interface, and throw and throws, and why we use throws?? Why String is Immutable?
Explaining differences between abstract class and interface, throw and throws, and why we use throws. Also, why String is immutable.
Abstract class can have both abstract and non-abstract methods, while interface can only have abstract methods.
A class can implement multiple interfaces, but can only extend one abstract class.
Throw is used to explicitly throw an exception, while throws is used to declare the exceptions that a method may throw.
We use throws to inform the caller o...read more
You are given a year in the form of an integer 'N', and your task is to check whether the given year is a leap year or not.
Note:
1) A year is said to be a leap year if it has 366 days. Normal years ha...read more
Q14. Do you have any previous project. If yes what programming language it is in?
Yes, I have worked on a project where I developed a web application using Java programming language.
Developed a web application using Java programming language
Implemented various features and functionalities
Collaborated with a team of developers to ensure project success
Q15. What is your understanding of Java Object-Oriented Programming (OOP)?
Java OOP is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.
Java OOP involves the use of classes and objects.
Encapsulation is a key concept where data is kept private within a class and accessed through public methods.
Inheritance allows one class to inherit attributes and methods from another class.
Polymorphism enables objects to be treated as instances of their parent class.
Abstraction in...read more
Q16. What is FDS , did you create and if create tell me the requirement?
FDS stands for Functional Design Specification, a document that outlines the functional requirements of a system.
FDS is created by functional consultants to define the business requirements of a system
It includes details on the system's functionality, data flow, and user interface
FDS serves as a blueprint for developers to build the system according to the business requirements
Example of FDS requirement: The system should allow users to create purchase orders and track their ...read more
Q17. 1) Internals of Hashmap 2) What is the ER diagram, and draw the ER diagram of your project. 3) What is Synchronization in Java? Explain Deadlock.
A hashmap is a data structure that stores key-value pairs and provides fast retrieval of values based on their keys.
Hashmap is implemented using an array of linked lists or a balanced tree
It uses a hash function to convert keys into array indices
Collision can occur when two keys hash to the same index, resolved using separate chaining or open addressing
Retrieval of values is fast as it directly calculates the index using the hash function
Insertion and deletion operations can ...read more
Q18. 2.What is difference between stack and queue?
Stack is a LIFO data structure while Queue is a FIFO data structure.
Stack follows Last In First Out (LIFO) principle while Queue follows First In First Out (FIFO) principle.
Stack has two main operations: push and pop while Queue has two main operations: enqueue and dequeue.
Stack is used in recursive function calls, undo/redo operations, and backtracking while Queue is used in breadth-first search, printing tasks in order, and handling requests in a web server.
Examples of Stac...read more
Q19. 3.Write SQL query to find second highest salary in database?
SQL query to find second highest salary in database
Use ORDER BY and LIMIT to get the second highest salary
Assume ties are allowed and use DISTINCT
Q20. Linux / windows which one is more secure?
Both Linux and Windows have their own security features and vulnerabilities.
Linux is known for its strong security features like SELinux and AppArmor.
Windows has improved its security with features like Windows Defender and BitLocker.
However, both operating systems have had their fair share of security vulnerabilities and attacks.
Ultimately, the level of security depends on how well the system is configured and maintained.
It's important to regularly update and patch both Linu...read more
Q21. what should a system administrator`s routine be?
A system administrator's routine involves monitoring system performance, troubleshooting issues, implementing security measures, and maintaining backups.
Regularly monitoring system performance and resource usage
Troubleshooting and resolving technical issues as they arise
Implementing and maintaining security measures to protect the system from cyber threats
Performing regular backups and ensuring data integrity
Updating software and firmware to ensure system stability and securi...read more
Q22. What you know about electric vehicle
Electric vehicles are vehicles that run on electricity instead of gasoline or diesel.
Electric vehicles use rechargeable batteries to power an electric motor.
They produce zero emissions, making them environmentally friendly.
Electric vehicles can be charged at home or at public charging stations.
They are becoming more popular as technology improves and prices decrease.
Examples of electric vehicles include the Tesla Model S, Nissan Leaf, and Chevy Bolt.
Q23. 4. Difference Between method overloading and method overriding?
Method overloading is having multiple methods with the same name but different parameters. Method overriding is having a method in a subclass with the same name and parameters as a method in its superclass.
Method overloading is done within the same class while method overriding is done in different classes (subclass and superclass).
Method overloading is achieved by changing the number of parameters or the data type of parameters while method overriding is achieved by changing...read more
Q24. Write a code for swapping of 2 numbers without using 3rd variable
Swapping two numbers without using a third variable in code
Use bitwise XOR operation to swap two numbers without using a third variable
Example: a = 5, b = 7. a = a XOR b, b = a XOR b, a = a XOR b
Ensure to handle edge cases like swapping same numbers
Q25. How to display multiple screen in one layout
To display multiple screens in one layout, use the SAP Screen Painter tool and create a custom screen with multiple subscreens.
Create a custom screen using the SAP Screen Painter tool
Add multiple subscreens to the custom screen
Define the layout of each subscreen using the Screen Painter
Use the PBO (Process Before Output) module to display the subscreens in the desired layout
Use the PAI (Process After Input) module to handle user input from the subscreens
Q26. What is difference between Machine Learning and Deep Learning
Machine learning is a subset of AI that allows systems to learn from data and make predictions, while deep learning is a subset of machine learning that uses neural networks to model and process data.
Machine learning is a broader concept that involves algorithms that can learn from and make predictions on data.
Deep learning is a subset of machine learning that uses neural networks with multiple layers to model and process data.
Deep learning requires a large amount of data and...read more
Q27. SQL joins difference, daily activities whatever done in previous organization
Explained SQL joins and daily activities from previous organization.
Explained different types of SQL joins such as inner join, left join, right join, and full outer join.
Gave examples of how to use SQL joins to combine data from multiple tables.
Discussed daily activities such as troubleshooting database issues, optimizing queries, and creating reports.
Mentioned experience with database management systems like MySQL, Oracle, and SQL Server.
Q28. Explain this line public static void main (string args [])
Entry point of Java program, must be public, static, void and accept array of strings as argument.
public: method can be accessed from anywhere
static: method belongs to class, not instance
void: method does not return any value
main: method name, entry point of program
string args[]: array of strings, command line arguments
Q29. Difference between ArrayList, HashSet and HashMap
ArrayList is a resizable array, HashSet is an unordered collection of unique elements, and HashMap is a key-value pair collection.
ArrayList allows duplicates and maintains insertion order
HashSet does not allow duplicates and does not maintain order
HashMap stores key-value pairs and allows null values for both keys and values
Q30. What is Ansible How to maintains secret in Ansible How to monitor k8s
Ansible is an open-source automation tool that helps in configuration management, application deployment, and task automation.
Ansible uses YAML syntax to define tasks and playbooks
It uses SSH protocol to communicate with remote servers
Ansible Vault is used to maintain secrets like passwords, API keys, etc.
To monitor k8s, Ansible provides modules like k8s_info, k8s_scale, k8s_service, etc.
Q31. what is different between workgroup and domain
Workgroup is a peer-to-peer network where each computer has its own security settings, while a domain is a centralized network managed by a server with shared security settings.
Workgroup is decentralized, each computer manages its own security settings
Domain is centralized, managed by a server with shared security settings
Workgroup is suitable for small networks, domain is suitable for larger networks
In a workgroup, users have to create accounts on each computer they want to ...read more
Q32. Where you check the application logs in SAP?
Application logs in SAP can be checked in transaction code SLG1.
Application logs can be checked in transaction code SLG1.
Logs can also be viewed in transaction code SM21 for system logs.
Use transaction code ST11 for developer traces.
Logs can be accessed directly in the file system using transaction AL11.
Q33. What is difference between malloc and calloc
malloc allocates memory but does not initialize it, while calloc allocates and initializes memory to zero.
malloc() takes a single argument, the number of bytes to allocate, while calloc() takes two arguments, the number of elements to allocate and the size of each element.
malloc() returns a pointer to the allocated memory block, while calloc() returns a pointer to the first byte of the allocated memory block.
calloc() is useful for allocating memory for arrays, as it initializ...read more
Q34. What is the use of constructor? When it will be called
Constructor is used to initialize an object. It is called when an object is created.
Constructor is a special method with the same name as the class.
It is used to initialize the instance variables of a class.
It is called automatically when an object is created using the new keyword.
Constructors can be overloaded to provide different ways of initializing objects.
Example: public class Employee { public Employee() { // constructor code } }
Q35. What is public and instance class
Public and instance classes are two types of classes in object-oriented programming.
Public classes can be accessed from anywhere in the program, while instance classes can only be accessed within their own instance.
Public classes are often used for utility classes or classes that need to be accessed globally, while instance classes are used for encapsulation and data hiding.
Example of public class: Math class in Java. Example of instance class: Person class with private insta...read more
Q36. What do you know about Angular?
Angular is a popular JavaScript framework for building web applications.
Angular is a TypeScript-based open-source framework developed by Google.
It is used for building single-page applications (SPAs) and dynamic web pages.
Angular follows the MVC (Model-View-Controller) architectural pattern.
It provides features like data binding, dependency injection, and modular development.
Angular has a powerful CLI (Command Line Interface) for scaffolding and managing projects.
Some popular...read more
Q37. Swap two variables values without using third variable
Swap two variables values without using third variable
Use XOR operation to swap two variables without using a third variable
Example: a = 5, b = 10. a = a XOR b, b = a XOR b, a = a XOR b
Ensure variables are not the same to avoid getting zero as result
Q38. What are the functions used in a particular code.
The functions used in the code are calculateSum, displayResult, and validateInput.
calculateSum - calculates the sum of two numbers
displayResult - displays the result of the calculation
validateInput - checks the validity of user input
Q39. Is Java a complete OOP language?
Yes, Java is a complete OOP language with features like classes, objects, inheritance, encapsulation, and polymorphism.
Java supports classes and objects for creating reusable code.
It implements inheritance, allowing classes to inherit attributes and methods from other classes.
Encapsulation is achieved through access modifiers like private, protected, and public.
Polymorphism is supported through method overloading and overriding.
Java also includes features like abstraction and...read more
Q40. Current technology in my core field
Current technology in my core field is focused on automation, cloud computing, and artificial intelligence.
Automation is being used to streamline processes and increase efficiency.
Cloud computing is becoming more prevalent as companies move towards remote work and data storage.
Artificial intelligence is being used for data analysis and decision-making.
Machine learning is being used to improve automation and AI capabilities.
Internet of Things (IoT) is being used to connect dev...read more
Q41. VSAMs. Define, access and Alternate index.
VSAMs are Virtual Storage Access Method datasets used in mainframe systems for efficient data storage and retrieval.
VSAMs are used to store large amounts of data in a mainframe system.
They provide efficient access to data through various access methods like sequential, random, and dynamic.
Alternate index is a feature of VSAM that allows data to be accessed through a secondary key instead of the primary key.
VSAMs are commonly used for storing transactional data in banking and ...read more
Q42. How to perform keyboard events in selenium
Keyboard events in Selenium can be performed using the Actions class
Use the Actions class to create a new instance
Use the sendKeys method to send keyboard events like typing text
Use the keyDown and keyUp methods to simulate pressing and releasing keys
Q43. 1. Scrum Ceremonies 2. Do we include V&V during Sprint planning 3. Scrum and Kanban differentiate 4. Scrum Planning Estimation Techniques or types 5. Product backlog vs sprint backlog 6. sprint review what happ...
read moreQuestions related to Scrum methodology and agile practices.
Scrum ceremonies include daily stand-up, sprint planning, sprint review, and sprint retrospective.
Verification and validation (V&V) should be included in sprint planning.
Scrum and Kanban differ in terms of roles, ceremonies, and visualization techniques.
Scrum planning estimation techniques include planning poker, t-shirt sizing, and affinity mapping.
Product backlog contains all the user stories while sprint backlog co...read more
Q44. 1.What is Opps concepts in Java.
OOPs concepts in Java are the fundamental principles of object-oriented programming.
Encapsulation: wrapping data and code into a single unit
Inheritance: creating new classes from existing ones
Polymorphism: using a single interface to represent multiple types
Abstraction: hiding implementation details from the user
Examples: class, object, inheritance, polymorphism, encapsulation
Q45. What is C, advantages of c...etc?
C is a high-level programming language known for its efficiency, flexibility, and portability.
Advantages of C include high performance, close-to-hardware functionality, and a large library of functions.
C is widely used in system programming, embedded systems, and developing operating systems.
C allows for low-level manipulation of memory and provides direct access to hardware, making it suitable for developing device drivers.
C is portable across different platforms and compile...read more
Q46. Use of Static Variable in Java
Static variables in Java are shared among all instances of a class and retain their value throughout the program.
Static variables are declared using the 'static' keyword.
They are initialized only once, at the start of the program.
They can be accessed directly using the class name, without creating an instance of the class.
Changes made to a static variable are reflected in all instances of the class.
Static variables are commonly used for constants or to keep track of global st...read more
Q47. Tell about P2P cycle in details?
P2P cycle is the process of procuring goods or services from a vendor and paying for them.
The cycle starts with creating a purchase requisition
The purchase requisition is then converted into a purchase order
Goods or services are received and inspected
Invoice is received and matched with the purchase order and goods receipt
Payment is made to the vendor
The cycle ends with closing the purchase order
Q48. How to handle option values in swift
Option values in Swift can be handled using enums, switch statements, and optional binding.
Use enums to define a set of possible values for an option
Use switch statements to handle each possible value of the option
Use optional binding to safely unwrap optional values
Q49. How to do API using service manager
APIs can be created using Service Manager by defining endpoints and methods for interacting with the service.
Define the API endpoints and methods in the Service Manager configuration.
Implement the logic for handling API requests and responses.
Test the API endpoints using tools like Postman to ensure functionality.
Secure the API by implementing authentication and authorization mechanisms.
Q50. What is merge Sort? Write the code?
Merge Sort is a divide and conquer algorithm that sorts an array by dividing it into two halves, sorting them separately, and then merging the results.
Divide the array into two halves
Recursively sort the two halves
Merge the sorted halves
Repeat until the entire array is sorted
Q51. What are new features in angular13?
Angular 13 is not released yet, so there are no new features to discuss.
Angular 13 has not been released yet
No official information on new features available
Q52. What is lazy loading in angular ?
Lazy loading in Angular is a technique used to load modules only when they are required, improving performance by reducing initial load time.
Lazy loading helps in reducing the initial bundle size of the application.
It allows for faster loading times as only the required modules are loaded when needed.
Lazy loading is achieved by using the loadChildren property in the route configuration of Angular modules.
Example: loadChildren: () => import('./lazy-loaded-module').then(m => m....read more
Q53. What do you understand by AAA ?
AAA stands for Authentication, Authorization, and Accounting.
Authentication: verifying the identity of a user or device
Authorization: granting access to specific resources or actions
Accounting: tracking and recording usage of resources for billing or auditing purposes
Q54. How VPN works
VPN stands for Virtual Private Network. It allows secure remote access to a private network over the internet.
VPN creates a secure and encrypted connection between the user's device and the private network.
It masks the user's IP address and location, providing anonymity and privacy.
VPN uses different protocols such as PPTP, L2TP, IPSec, and OpenVPN.
It can be used to access geographically restricted content, bypass censorship, and protect against cyber threats.
VPN can be set u...read more
Q55. What is VTP
VTP stands for VLAN Trunking Protocol, used to manage VLANs in a switched network.
VTP is a Cisco proprietary protocol.
It allows for easy VLAN management by propagating VLAN information across the network.
VTP operates in three modes: server, client, and transparent.
Server mode allows for VLAN creation, deletion, and modification.
Client mode receives and stores VLAN information.
Transparent mode forwards VTP messages but does not participate in VTP updates.
VTP version 3 introduc...read more
Q56. Probability for to pick a gold ball out of 100balls
The probability of picking a gold ball out of 100 balls is 1%
The probability is calculated by dividing the number of gold balls by the total number of balls
Assuming there is only one gold ball, the probability is 1/100 or 0.01
If there are multiple gold balls, the probability will be higher
Q57. Which version of Angular have you used
I have used Angular 2, 4, 5, 6, 7, 8, 9, and 10.
I have experience in developing web applications using Angular 2 and above.
I have worked on Angular projects with various versions including 4, 5, 6, 7, 8, 9, and 10.
I am familiar with the latest features and updates in Angular 10.
I have used Angular CLI for creating and managing Angular projects.
I have experience in implementing Angular Material design components.
I have worked on projects that involve integrating Angular with b...read more
Q58. What is Angular and it's advantages
Angular is a popular front-end framework developed by Google for building dynamic web applications.
Angular is based on TypeScript, a superset of JavaScript, which adds static typing and other features to the language.
It follows the MVC (Model-View-Controller) architecture, making it easier to organize code and separate concerns.
Angular provides two-way data binding, which allows changes in the model to be automatically reflected in the view and vice versa.
It offers a rich set...read more
Q59. Difference between public ,private and protected in java
In Java, public, private, and protected are access modifiers used to control the visibility of classes, methods, and variables.
public: accessible from any other class
private: accessible only within the same class
protected: accessible within the same package and subclasses
Example: public class MyClass {}
Example: private int myVar;
Example: protected void myMethod() {}
Q60. How to save and load ML model weights?
ML model weights can be saved and loaded using serialization libraries like pickle or joblib.
Use serialization libraries like pickle or joblib to save and load model weights.
For saving weights: model.save_weights('model_weights.h5')
For loading weights: model.load_weights('model_weights.h5')
Q61. What is eventloop in nodejs?
Eventloop is a mechanism in Node.js that allows non-blocking I/O operations to be performed efficiently.
Eventloop is responsible for handling asynchronous callbacks in Node.js
It continuously checks the event queue for new events to process
It executes the callbacks in the event queue in a non-blocking manner
It allows Node.js to handle multiple requests simultaneously
It is a key feature that makes Node.js highly scalable
Q62. What is polymorphism and OOPs concept
Polymorphism is the ability of a single function or method to operate on different data types. OOPs concept refers to Object-Oriented Programming principles like inheritance, encapsulation, and abstraction.
Polymorphism allows a function to take different forms based on the input data type.
OOPs concept includes inheritance, where a class can inherit properties and methods from another class.
Encapsulation involves bundling data and methods that operate on the data into a single...read more
Q63. What is super class?
A super class is a class that is inherited by other classes, providing them with common attributes and behaviors.
Super class is also known as a base class or parent class.
It serves as a blueprint for creating derived classes.
Derived classes inherit the properties and methods of the super class.
Super class can be extended or overridden by the derived classes.
Super class promotes code reusability and modularity.
Example: In a vehicle hierarchy, 'Vehicle' can be a super class wit...read more
Q64. How do you resolve a production issue?
I follow a systematic approach by identifying the root cause, implementing a temporary fix if needed, testing the solution, and documenting the resolution.
Identify the root cause of the issue
Implement a temporary fix if necessary to restore production
Test the solution to ensure it resolves the issue
Document the resolution for future reference
Q65. What is procedure in plsql and it's syntax and difference between procedure and function?
A procedure in PL/SQL is a named block of code that can be called and executed multiple times.
Syntax: CREATE [OR REPLACE] PROCEDURE procedure_name [(parameter1 [mode1] datatype1 [, parameter2 [mode2] datatype2]...)] IS
Difference between procedure and function: Procedures do not return a value, while functions return a value.
Procedures are used to perform an action, while functions are used to calculate and return a value.
Procedures can have OUT or IN OUT parameters to pass va...read more
Q66. What is Android framework architecture
Android framework architecture is a set of APIs provided by the Android SDK to support the development of applications on the Android platform.
Consists of various layers such as application framework, libraries, runtime, and Linux kernel
Provides developers with tools and APIs to build and interact with applications
Includes components like Activity Manager, Content Providers, View System, and Package Manager
Q67. What is temp table and temp variable in plsql?
Temp table is a table created temporarily in memory. Temp variable is a variable that holds temporary data.
Temp table is used to store data temporarily during a session
Temp variable is used to hold temporary data that is not needed after a certain point
Temp table and variable are created using the 'CREATE GLOBAL TEMPORARY' and 'DECLARE' statements respectively
Example: CREATE GLOBAL TEMPORARY TABLE temp_table (id NUMBER, name VARCHAR2(50));
Example: DECLARE temp_var VARCHAR2(50...read more
Q68. 1. What is JDK, JVM, JRE.
JDK is a development kit, JRE is a runtime environment, and JVM is a virtual machine for executing Java code.
JDK includes JRE and development tools like javac and java
JRE includes JVM and necessary libraries to run Java applications
JVM is responsible for interpreting Java bytecode and executing it
Example: JDK 8 includes JRE 8 and development tools like javac and java
Example: JRE 8 includes JVM 8 and necessary libraries to run Java applications
Q69. Tell me the life cycle of mvc
MVC life cycle involves request handling, routing, controller execution, view rendering, and response generation.
Client sends a request to the server
Routing maps the request to a specific controller
Controller executes the requested action and interacts with the model
View is rendered with the data from the model
Response is generated and sent back to the client
Q70. What is pandas and how to use
pandas is a Python library used for data manipulation and analysis.
pandas provides data structures like DataFrame and Series for handling data
It can read and write data from various file formats like CSV, Excel, SQL databases
pandas allows for data cleaning, filtering, grouping, and merging operations
Example: df = pd.read_csv('data.csv') creates a DataFrame from a CSV file
Q71. write a program to show patterns
Program to display patterns using arrays of strings
Use nested loops to iterate through rows and columns of the array
Fill the array with characters to create the desired pattern
Print each row of the array to display the pattern
Q72. Python coad to find 2nd largest number in arrey
Python code to find the 2nd largest number in an array.
Sort the array in descending order
Return the element at index 1
Q73. Tell about cyber security?
Cyber security refers to the practice of protecting computer systems, networks, and sensitive information from unauthorized access, theft, or damage.
Cyber security involves implementing measures to prevent cyber attacks and data breaches.
It includes using firewalls, antivirus software, and encryption to protect systems and data.
Cyber security also involves educating users about safe online practices and implementing policies and procedures to ensure security.
Examples of cyber...read more
Q74. What is the significance of vendor account group?
Vendor account group determines the fields that are mandatory for a vendor master record.
Vendor account group is used to group vendors based on certain criteria such as payment terms, delivery time, etc.
It determines the fields that are mandatory for a vendor master record.
It also determines the number range for vendor account codes.
For example, a vendor account group can be created for domestic vendors and another for international vendors.
Each vendor account group can have ...read more
Q75. Write a code on bubble sort in c?
Bubble sort is a simple sorting algorithm that repeatedly steps through the list, compares adjacent elements and swaps them if they are in the wrong order.
Initialize an array of strings to be sorted
Use nested loops to compare adjacent elements and swap them if necessary
Repeat the process until the array is sorted
Q76. What is grep in Linux?
Grep is a command-line utility in Linux used to search for specific patterns in text files.
Grep stands for 'Global Regular Expression Print'.
It is used to search for a specific pattern in one or more files.
Grep can be used with regular expressions to perform complex pattern matching.
Example: grep 'search_term' file.txt
Example: grep -i 'pattern' file1.txt file2.txt
Q77. Introduction project details why IT coding
I have experience working on various IT projects involving coding, which is why I am interested in the System Engineer role.
I have worked on multiple IT projects where I was responsible for coding and system engineering tasks.
I am passionate about IT and enjoy the challenge of problem-solving through coding.
I believe that my coding skills and experience make me a strong candidate for the System Engineer position.
Q78. What is IAM? What is AD?
IAM stands for Identity and Access Management. AD stands for Active Directory.
IAM is a framework for managing digital identities and controlling access to resources.
AD is a Microsoft product that provides directory services, authentication, and authorization.
IAM and AD are often used together to manage user access to resources in an organization.
IAM solutions include Okta, OneLogin, and Azure AD.
AD is commonly used in Windows environments to manage user accounts, computers, a...read more
Q79. What is MVC? How it works
MVC stands for Model-View-Controller. It is a software design pattern used to separate an application's concerns.
Model represents the data and business logic
View displays the data to the user
Controller handles user input and updates the model and view accordingly
MVC promotes separation of concerns and modularity
Examples include Ruby on Rails, ASP.NET MVC, and Spring MVC
Q80. What is Java and spring boot ?
Java is a popular programming language used for developing various applications. Spring Boot is a framework that simplifies the development of Java-based applications.
Java is an object-oriented programming language known for its portability and versatility.
Spring Boot is a framework that simplifies the development of Java-based applications by providing pre-configured settings and tools.
Spring Boot allows developers to quickly set up and run standalone Spring-based applicatio...read more
Q81. Real life examples of Data Structure
Data structures are used in various real-life scenarios to organize and manage data efficiently.
Phone contacts stored in a hash table for quick access
Employee records stored in a linked list for easy insertion and deletion
File system organized as a tree structure for hierarchical storage
Q82. Tell me about your current project. Difference between managed and external table. Architecture of spark. What is RDD. Characteristics of RDD. Meaning of lazy nature. Insert statement for managed and external t...
read moreInterview questions for a PySpark Developer
Explained current project and its implementation
Differentiated between managed and external table
Described Spark architecture and RDD
Discussed characteristics of RDD and lazy nature
Provided insert statement for managed and external table
Explained deployment related to code in PySpark
Answered Python related questions
Explained how to convince manager/scrum master for code changes
Discussed team size and management
Q83. What is Array and String
An array is a data structure that stores a collection of elements of the same type. A string is a sequence of characters.
Arrays can be one-dimensional, two-dimensional, or multi-dimensional.
Strings are typically used to represent text and are enclosed in quotation marks.
Arrays and strings are both commonly used in programming languages.
Example of an array: [1, 2, 3, 4, 5]
Example of a string: 'Hello, World!'
Q84. What's SQL and why we use it?
SQL is a programming language used for managing and manipulating relational databases.
SQL stands for Structured Query Language
It is used to communicate with databases to perform tasks such as querying data, updating data, and creating databases
Examples of SQL commands include SELECT, INSERT, UPDATE, DELETE
SQL is essential for managing large amounts of data efficiently
Q85. What is new in Java 11
Java 11 introduces new features like local variable type inference, HTTP client API, and Epsilon garbage collector.
Local variable type inference allows the compiler to infer the type of a local variable based on its initializer.
HTTP client API provides a standard API for making HTTP requests and handling responses.
Epsilon garbage collector is a no-op garbage collector that can be used for performance testing and short-lived applications.
Other features include Unicode 10 suppo...read more
Q86. Mail flow in on premise and o365 environment
Mail flow in on-premise and O365 environment
In on-premise environment, mail flow is managed by Exchange servers installed on-premises
In O365 environment, mail flow is managed by Exchange Online Protection (EOP) and Exchange Online servers
In a hybrid environment, mail flow can be managed by both on-premise Exchange servers and EOP/Exchange Online servers
Mail flow can be configured using connectors, transport rules, and mail flow policies
Q87. How to handal application
Handling applications involves monitoring, troubleshooting, and optimizing performance.
Monitor application performance regularly to identify any issues or bottlenecks
Troubleshoot any errors or bugs that arise in the application
Optimize the application by fine-tuning configurations and resources
Implement security measures to protect the application from threats
Document changes and updates made to the application for future reference
Q88. what is oops and its feature
OOPs stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.
OOPs features include encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation refers to the bundling of data with the methods that operate on that data.
Inheritance allows classes to inherit attributes and methods from other classes.
Polymorphism allows objects to be treated as ...read more
Q89. Explain oops concepts with an example
Explanation of OOPs concepts with an example
OOPs stands for Object-Oriented Programming
Encapsulation - Binding data and functions that manipulate the data together
Inheritance - A class can inherit properties and methods from another class
Polymorphism - Ability of an object to take many forms
Abstraction - Hiding implementation details and showing only functionality
Example: A car is an object that has properties like color, model, and methods like start, stop, accelerate
Encapsu...read more
You have given a sorted array 'A' of 'N' integers.
Now, you are given 'Q' queries, and each query consists of a single integer 'X'. Your task is to check whether 'X' is present in a...read more
Q91. 1. What is interface how to use? 2. Tell me a small example for interface? 3. How to managing the Error Logging system at your application 4. How you implement Security at your application 5. What are the Joins...
read moreAnswering questions related to IT Analyst position
An interface is a contract between two objects that defines the communication between them
An example of an interface is the Java interface, which defines a set of methods that a class must implement
Error logging can be managed by setting up a system to capture and store error messages, and regularly reviewing and addressing them
Security can be implemented through measures such as authentication, authorization, encryption, and ...read more
Q92. What is a database management System and what is concept of primary key and foreign key?
A database management system (DBMS) is a software that manages and organizes databases. Primary key uniquely identifies a record, while foreign key establishes a relationship between tables.
A DBMS is a software that allows users to create, manage, and manipulate databases.
It provides tools for creating, modifying, and deleting databases, tables, and records.
Primary key is a unique identifier for a record in a table.
Foreign key establishes a relationship between two tables by ...read more
You are given a Singly Linked List of integers with a head pointer. Every node of the Linked List has a value written on it.
A sample Linked List
Now you have been given an integer value...read more
Q94. Difference in .net framework and core
The .NET Framework is a traditional framework for Windows applications, while .NET Core is a cross-platform, open-source framework.
The .NET Framework is primarily for Windows applications, while .NET Core is cross-platform and can run on Windows, macOS, and Linux.
The .NET Framework is closed-source, while .NET Core is open-source.
The .NET Framework is not modular, while .NET Core is modular and allows developers to include only the necessary components in their applications.
T...read more
Q95. How does YOLO algorithm works?
YOLO (You Only Look Once) algorithm is a real-time object detection system that processes images in a single pass.
YOLO divides the image into a grid and predicts bounding boxes and probabilities for each grid cell.
It uses a single neural network to predict multiple bounding boxes and class probabilities simultaneously.
YOLO is known for its speed and accuracy in object detection tasks.
Example: YOLO can detect objects like cars, people, and animals in images or videos.
Q96. What is HSIT?
HSIT stands for Hardware and Software Integration Testing.
HSIT is a type of testing that verifies the compatibility and functionality of hardware and software components.
It is usually performed after unit testing and before system testing.
HSIT can help identify any issues with the integration of hardware and software, such as driver conflicts or compatibility issues.
Examples of HSIT include testing the compatibility of a new graphics card with existing software or testing the...read more
Q97. What is MC/DC?
MC/DC stands for Modified Condition/Decision Coverage, a testing technique used to ensure that each condition in a decision statement is tested independently.
MC/DC is a type of coverage criteria used in software testing.
It ensures that each condition in a decision statement is tested independently.
It requires that each condition be shown to independently affect the outcome of the decision.
MC/DC is commonly used in safety-critical systems such as aviation and medical devices.
A...read more
Q98. What is Singleton class. What is the use of singleton class
Singleton class is a class that can only have one instance at a time.
It is used to ensure that there is only one instance of a class in the system.
It is often used in situations where a single object needs to coordinate actions across the system.
Example: Database connection class, logger class, configuration class.
It can be implemented using private constructors, static methods, and static variables.
Q99. Explain Android AIDL Communication
Android AIDL Communication is a mechanism for inter-process communication between Android components.
AIDL stands for Android Interface Definition Language
It allows different Android components to communicate with each other across different processes
AIDL files define the interface that the client and server components will use to communicate
AIDL is commonly used for communication between activities, services, and content providers
Q100. Explain different types of polymorphism.
Polymorphism in programming refers to the ability of a single function or method to operate on different types of data.
Compile-time polymorphism (static binding): achieved using function overloading and operator overloading
Run-time polymorphism (dynamic binding): achieved using function overriding and virtual functions
Ad-hoc polymorphism: achieved using templates or generics
Parametric polymorphism: achieved using inheritance and interfaces
More about working at TCS
Top HR Questions asked in Innovatiview India Ltd
Interview Process at Innovatiview India Ltd
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month