Add office photos
Engaged Employer

TCS

3.7
based on 85.2k Reviews
Filter interviews by

1500+ Innovatiview India Ltd Interview Questions and Answers

Updated 9 Jan 2025
Popular Designations

Q1. How charging protocol works in electric vehicle and what is purpose of charging pin at charging inlet

Ans.

Charging protocol in EVs and purpose of charging pin at inlet

  • Charging protocol determines how the battery is charged and how much power is delivered

  • Charging pin is used to connect the charging cable to the vehicle's charging inlet

  • Charging protocols include AC charging, DC charging, and wireless charging

  • Charging protocols also include different charging levels such as Level 1, Level 2, and Level 3

  • Purpose of charging pin is to ensure safe and reliable transfer of power from the...read more

View 1 answer

Q2. What is basic function of firewall.

Ans.

Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

  • Firewall acts as a barrier between a trusted, secure internal network and another network, such as the Internet.

  • It examines each packet of data that passes through it and determines whether to allow or block the traffic based on the set of rules.

  • Firewalls can be hardware or software-based and can be configured to block specific types of ...read more

Add your answer

Q3. What is middleware in nodejs? Explain with examples.

Ans.

Middleware in Node.js is a function that sits between the server and the client and performs various tasks.

  • Middleware functions can be used to handle requests, modify responses, and perform authentication and authorization.

  • Examples of middleware in Node.js include body-parser, cookie-parser, and express-session.

  • Middleware functions are executed in the order they are defined in the code.

  • Middleware can be used to handle errors and pass them to the error handling middleware.

Add your answer

Q4. What is Control Coupling and Data Coupling? Explain the difference between them

Ans.

Control coupling and data coupling are two types of coupling in software engineering.

  • Control coupling occurs when one module controls the flow of another module through parameters or flags.

  • Data coupling occurs when two modules share data through parameters or global variables.

  • Control coupling is considered more tightly coupled than data coupling.

  • Examples of control coupling include passing a flag to a function to determine its behavior, or using a return value to control the ...read more

Add your answer
Discover Innovatiview India Ltd interview dos and don'ts from real experiences

Q5. Explain in detail about how you configure your api w.r.t frontend.

Ans.

API configuration for frontend

  • Define API endpoints and methods

  • Ensure API responses are in the correct format for frontend

  • Implement authentication and authorization

  • Optimize API performance for frontend usage

  • Document API usage for frontend developers

Add your answer

Q6. What is the difference between Router and firewall

Ans.

Routers connect networks while firewalls protect networks from unauthorized access.

  • Routers direct traffic between networks while firewalls filter traffic based on predefined rules.

  • Routers operate at layer 3 of the OSI model while firewalls operate at layer 4 or higher.

  • Examples of routers include Cisco routers, while examples of firewalls include Fortinet firewalls.

  • Routers can be used to segment networks while firewalls can be used to block malicious traffic.

  • Routers are essent...read more

Add your answer
Are these interview questions helpful?

Q7. Which are the difference Routing protocols

Ans.

Routing protocols are used to determine the best path for data to travel in a network.

  • Distance Vector protocols: RIP, IGRP, EIGRP

  • Link State protocols: OSPF, IS-IS

  • Hybrid protocols: BGP

  • Path Vector protocols: BGP

  • IGP vs EGP

Add your answer

Q8. Which are the BGP attributes

Ans.

BGP attributes are used to determine the best path for routing traffic between networks.

  • BGP attributes include: AS Path, Next Hop, Local Preference, MED, Origin, and Community

  • AS Path is a list of autonomous systems that the route has passed through

  • Next Hop is the IP address of the next router on the path

  • Local Preference is used to indicate the preferred path for outbound traffic

  • MED (Multi-Exit Discriminator) is used to indicate the preferred path for inbound traffic

  • Origin ind...read more

View 2 more answers
Share interview questions and help millions of jobseekers 🌟

Q9. Difference between SQL and NoSql database?

Ans.

SQL databases are relational and use structured query language, while NoSQL databases are non-relational and use various data models.

  • SQL databases are based on a fixed schema, while NoSQL databases are schema-less.

  • SQL databases use tables to store data, while NoSQL databases use various data models like key-value, document, columnar, or graph.

  • SQL databases are better suited for complex queries and structured data, while NoSQL databases are more flexible and scalable for unstr...read more

View 3 more answers

Q10. 5.which is the parent class of all classes in Java?

Ans.

The parent class of all classes in Java is the Object class.

  • All classes in Java implicitly extend the Object class.

  • The Object class provides basic methods such as toString(), equals(), and hashCode().

  • Any class can override these methods to provide custom implementations.

  • Example: public class MyClass extends Object { ... }

  • Example: Object obj = new MyClass();

Add your answer

Q11. How does inverter works. How is motor control

Ans.

Inverter converts DC to AC. Motor control involves adjusting frequency and voltage of AC to control motor speed.

  • Inverter uses power electronics to convert DC to AC

  • Motor control involves adjusting frequency and voltage of AC to control motor speed

  • Frequency and voltage are adjusted using pulse width modulation (PWM)

  • Motor speed can be controlled by adjusting the duty cycle of PWM signal

  • Examples of motor control techniques include scalar control and vector control

Add your answer

Q12. what are the difference between abstract class and interface, and throw and throws, and why we use throws?? Why String is Immutable?

Ans.

Explaining differences between abstract class and interface, throw and throws, and why we use throws. Also, why String is immutable.

  • Abstract class can have both abstract and non-abstract methods, while interface can only have abstract methods.

  • A class can implement multiple interfaces, but can only extend one abstract class.

  • Throw is used to explicitly throw an exception, while throws is used to declare the exceptions that a method may throw.

  • We use throws to inform the caller o...read more

View 5 more answers
Q13. Leap year

You are given a year in the form of an integer 'N', and your task is to check whether the given year is a leap year or not.

Note:

1) A year is said to be a leap year if it has 366 days. Normal years ha...read more
View 3 more answers

Q14. Do you have any previous project. If yes what programming language it is in?

Ans.

Yes, I have worked on a project where I developed a web application using Java programming language.

  • Developed a web application using Java programming language

  • Implemented various features and functionalities

  • Collaborated with a team of developers to ensure project success

Add your answer

Q15. What is your understanding of Java Object-Oriented Programming (OOP)?

Ans.

Java OOP is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.

  • Java OOP involves the use of classes and objects.

  • Encapsulation is a key concept where data is kept private within a class and accessed through public methods.

  • Inheritance allows one class to inherit attributes and methods from another class.

  • Polymorphism enables objects to be treated as instances of their parent class.

  • Abstraction in...read more

Add your answer

Q16. What is FDS , did you create and if create tell me the requirement?

Ans.

FDS stands for Functional Design Specification, a document that outlines the functional requirements of a system.

  • FDS is created by functional consultants to define the business requirements of a system

  • It includes details on the system's functionality, data flow, and user interface

  • FDS serves as a blueprint for developers to build the system according to the business requirements

  • Example of FDS requirement: The system should allow users to create purchase orders and track their ...read more

View 4 more answers

Q17. 1) Internals of Hashmap 2) What is the ER diagram, and draw the ER diagram of your project. 3) What is Synchronization in Java? Explain Deadlock.

Ans.

A hashmap is a data structure that stores key-value pairs and provides fast retrieval of values based on their keys.

  • Hashmap is implemented using an array of linked lists or a balanced tree

  • It uses a hash function to convert keys into array indices

  • Collision can occur when two keys hash to the same index, resolved using separate chaining or open addressing

  • Retrieval of values is fast as it directly calculates the index using the hash function

  • Insertion and deletion operations can ...read more

Add your answer

Q18. 2.What is difference between stack and queue?

Ans.

Stack is a LIFO data structure while Queue is a FIFO data structure.

  • Stack follows Last In First Out (LIFO) principle while Queue follows First In First Out (FIFO) principle.

  • Stack has two main operations: push and pop while Queue has two main operations: enqueue and dequeue.

  • Stack is used in recursive function calls, undo/redo operations, and backtracking while Queue is used in breadth-first search, printing tasks in order, and handling requests in a web server.

  • Examples of Stac...read more

Add your answer

Q19. 3.Write SQL query to find second highest salary in database?

Ans.

SQL query to find second highest salary in database

  • Use ORDER BY and LIMIT to get the second highest salary

  • Assume ties are allowed and use DISTINCT

Add your answer

Q20. Linux / windows which one is more secure?

Ans.

Both Linux and Windows have their own security features and vulnerabilities.

  • Linux is known for its strong security features like SELinux and AppArmor.

  • Windows has improved its security with features like Windows Defender and BitLocker.

  • However, both operating systems have had their fair share of security vulnerabilities and attacks.

  • Ultimately, the level of security depends on how well the system is configured and maintained.

  • It's important to regularly update and patch both Linu...read more

Add your answer

Q21. what should a system administrator`s routine be?

Ans.

A system administrator's routine involves monitoring system performance, troubleshooting issues, implementing security measures, and maintaining backups.

  • Regularly monitoring system performance and resource usage

  • Troubleshooting and resolving technical issues as they arise

  • Implementing and maintaining security measures to protect the system from cyber threats

  • Performing regular backups and ensuring data integrity

  • Updating software and firmware to ensure system stability and securi...read more

Add your answer

Q22. What you know about electric vehicle

Ans.

Electric vehicles are vehicles that run on electricity instead of gasoline or diesel.

  • Electric vehicles use rechargeable batteries to power an electric motor.

  • They produce zero emissions, making them environmentally friendly.

  • Electric vehicles can be charged at home or at public charging stations.

  • They are becoming more popular as technology improves and prices decrease.

  • Examples of electric vehicles include the Tesla Model S, Nissan Leaf, and Chevy Bolt.

Add your answer

Q23. 4. Difference Between method overloading and method overriding?

Ans.

Method overloading is having multiple methods with the same name but different parameters. Method overriding is having a method in a subclass with the same name and parameters as a method in its superclass.

  • Method overloading is done within the same class while method overriding is done in different classes (subclass and superclass).

  • Method overloading is achieved by changing the number of parameters or the data type of parameters while method overriding is achieved by changing...read more

Add your answer

Q24. Write a code for swapping of 2 numbers without using 3rd variable

Ans.

Swapping two numbers without using a third variable in code

  • Use bitwise XOR operation to swap two numbers without using a third variable

  • Example: a = 5, b = 7. a = a XOR b, b = a XOR b, a = a XOR b

  • Ensure to handle edge cases like swapping same numbers

Add your answer

Q25. How to display multiple screen in one layout

Ans.

To display multiple screens in one layout, use the SAP Screen Painter tool and create a custom screen with multiple subscreens.

  • Create a custom screen using the SAP Screen Painter tool

  • Add multiple subscreens to the custom screen

  • Define the layout of each subscreen using the Screen Painter

  • Use the PBO (Process Before Output) module to display the subscreens in the desired layout

  • Use the PAI (Process After Input) module to handle user input from the subscreens

View 6 more answers

Q26. What is difference between Machine Learning and Deep Learning

Ans.

Machine learning is a subset of AI that allows systems to learn from data and make predictions, while deep learning is a subset of machine learning that uses neural networks to model and process data.

  • Machine learning is a broader concept that involves algorithms that can learn from and make predictions on data.

  • Deep learning is a subset of machine learning that uses neural networks with multiple layers to model and process data.

  • Deep learning requires a large amount of data and...read more

Add your answer

Q27. SQL joins difference, daily activities whatever done in previous organization

Ans.

Explained SQL joins and daily activities from previous organization.

  • Explained different types of SQL joins such as inner join, left join, right join, and full outer join.

  • Gave examples of how to use SQL joins to combine data from multiple tables.

  • Discussed daily activities such as troubleshooting database issues, optimizing queries, and creating reports.

  • Mentioned experience with database management systems like MySQL, Oracle, and SQL Server.

Add your answer

Q28. Explain this line public static void main (string args [])

Ans.

Entry point of Java program, must be public, static, void and accept array of strings as argument.

  • public: method can be accessed from anywhere

  • static: method belongs to class, not instance

  • void: method does not return any value

  • main: method name, entry point of program

  • string args[]: array of strings, command line arguments

Add your answer

Q29. Difference between ArrayList, HashSet and HashMap

Ans.

ArrayList is a resizable array, HashSet is an unordered collection of unique elements, and HashMap is a key-value pair collection.

  • ArrayList allows duplicates and maintains insertion order

  • HashSet does not allow duplicates and does not maintain order

  • HashMap stores key-value pairs and allows null values for both keys and values

Add your answer

Q30. What is Ansible How to maintains secret in Ansible How to monitor k8s

Ans.

Ansible is an open-source automation tool that helps in configuration management, application deployment, and task automation.

  • Ansible uses YAML syntax to define tasks and playbooks

  • It uses SSH protocol to communicate with remote servers

  • Ansible Vault is used to maintain secrets like passwords, API keys, etc.

  • To monitor k8s, Ansible provides modules like k8s_info, k8s_scale, k8s_service, etc.

Add your answer

Q31. what is different between workgroup and domain

Ans.

Workgroup is a peer-to-peer network where each computer has its own security settings, while a domain is a centralized network managed by a server with shared security settings.

  • Workgroup is decentralized, each computer manages its own security settings

  • Domain is centralized, managed by a server with shared security settings

  • Workgroup is suitable for small networks, domain is suitable for larger networks

  • In a workgroup, users have to create accounts on each computer they want to ...read more

Add your answer

Q32. Where you check the application logs in SAP?

Ans.

Application logs in SAP can be checked in transaction code SLG1.

  • Application logs can be checked in transaction code SLG1.

  • Logs can also be viewed in transaction code SM21 for system logs.

  • Use transaction code ST11 for developer traces.

  • Logs can be accessed directly in the file system using transaction AL11.

Add your answer

Q33. What is difference between malloc and calloc

Ans.

malloc allocates memory but does not initialize it, while calloc allocates and initializes memory to zero.

  • malloc() takes a single argument, the number of bytes to allocate, while calloc() takes two arguments, the number of elements to allocate and the size of each element.

  • malloc() returns a pointer to the allocated memory block, while calloc() returns a pointer to the first byte of the allocated memory block.

  • calloc() is useful for allocating memory for arrays, as it initializ...read more

Add your answer

Q34. What is the use of constructor? When it will be called

Ans.

Constructor is used to initialize an object. It is called when an object is created.

  • Constructor is a special method with the same name as the class.

  • It is used to initialize the instance variables of a class.

  • It is called automatically when an object is created using the new keyword.

  • Constructors can be overloaded to provide different ways of initializing objects.

  • Example: public class Employee { public Employee() { // constructor code } }

View 4 more answers

Q35. What is public and instance class

Ans.

Public and instance classes are two types of classes in object-oriented programming.

  • Public classes can be accessed from anywhere in the program, while instance classes can only be accessed within their own instance.

  • Public classes are often used for utility classes or classes that need to be accessed globally, while instance classes are used for encapsulation and data hiding.

  • Example of public class: Math class in Java. Example of instance class: Person class with private insta...read more

Add your answer

Q36. What do you know about Angular?

Ans.

Angular is a popular JavaScript framework for building web applications.

  • Angular is a TypeScript-based open-source framework developed by Google.

  • It is used for building single-page applications (SPAs) and dynamic web pages.

  • Angular follows the MVC (Model-View-Controller) architectural pattern.

  • It provides features like data binding, dependency injection, and modular development.

  • Angular has a powerful CLI (Command Line Interface) for scaffolding and managing projects.

  • Some popular...read more

View 1 answer

Q37. Swap two variables values without using third variable

Ans.

Swap two variables values without using third variable

  • Use XOR operation to swap two variables without using a third variable

  • Example: a = 5, b = 10. a = a XOR b, b = a XOR b, a = a XOR b

  • Ensure variables are not the same to avoid getting zero as result

Add your answer

Q38. What are the functions used in a particular code.

Ans.

The functions used in the code are calculateSum, displayResult, and validateInput.

  • calculateSum - calculates the sum of two numbers

  • displayResult - displays the result of the calculation

  • validateInput - checks the validity of user input

View 3 more answers

Q39. Is Java a complete OOP language?

Ans.

Yes, Java is a complete OOP language with features like classes, objects, inheritance, encapsulation, and polymorphism.

  • Java supports classes and objects for creating reusable code.

  • It implements inheritance, allowing classes to inherit attributes and methods from other classes.

  • Encapsulation is achieved through access modifiers like private, protected, and public.

  • Polymorphism is supported through method overloading and overriding.

  • Java also includes features like abstraction and...read more

Add your answer

Q40. Current technology in my core field

Ans.

Current technology in my core field is focused on automation, cloud computing, and artificial intelligence.

  • Automation is being used to streamline processes and increase efficiency.

  • Cloud computing is becoming more prevalent as companies move towards remote work and data storage.

  • Artificial intelligence is being used for data analysis and decision-making.

  • Machine learning is being used to improve automation and AI capabilities.

  • Internet of Things (IoT) is being used to connect dev...read more

View 3 more answers

Q41. VSAMs. Define, access and Alternate index.

Ans.

VSAMs are Virtual Storage Access Method datasets used in mainframe systems for efficient data storage and retrieval.

  • VSAMs are used to store large amounts of data in a mainframe system.

  • They provide efficient access to data through various access methods like sequential, random, and dynamic.

  • Alternate index is a feature of VSAM that allows data to be accessed through a secondary key instead of the primary key.

  • VSAMs are commonly used for storing transactional data in banking and ...read more

Add your answer

Q42. How to perform keyboard events in selenium

Ans.

Keyboard events in Selenium can be performed using the Actions class

  • Use the Actions class to create a new instance

  • Use the sendKeys method to send keyboard events like typing text

  • Use the keyDown and keyUp methods to simulate pressing and releasing keys

Add your answer

Q43. 1. Scrum Ceremonies 2. Do we include V&V during Sprint planning 3. Scrum and Kanban differentiate 4. Scrum Planning Estimation Techniques or types 5. Product backlog vs sprint backlog 6. sprint review what happ...

read more
Ans.

Questions related to Scrum methodology and agile practices.

  • Scrum ceremonies include daily stand-up, sprint planning, sprint review, and sprint retrospective.

  • Verification and validation (V&V) should be included in sprint planning.

  • Scrum and Kanban differ in terms of roles, ceremonies, and visualization techniques.

  • Scrum planning estimation techniques include planning poker, t-shirt sizing, and affinity mapping.

  • Product backlog contains all the user stories while sprint backlog co...read more

View 1 answer

Q44. 1.What is Opps concepts in Java.

Ans.

OOPs concepts in Java are the fundamental principles of object-oriented programming.

  • Encapsulation: wrapping data and code into a single unit

  • Inheritance: creating new classes from existing ones

  • Polymorphism: using a single interface to represent multiple types

  • Abstraction: hiding implementation details from the user

  • Examples: class, object, inheritance, polymorphism, encapsulation

Add your answer

Q45. What is C, advantages of c...etc?

Ans.

C is a high-level programming language known for its efficiency, flexibility, and portability.

  • Advantages of C include high performance, close-to-hardware functionality, and a large library of functions.

  • C is widely used in system programming, embedded systems, and developing operating systems.

  • C allows for low-level manipulation of memory and provides direct access to hardware, making it suitable for developing device drivers.

  • C is portable across different platforms and compile...read more

Add your answer

Q46. Use of Static Variable in Java

Ans.

Static variables in Java are shared among all instances of a class and retain their value throughout the program.

  • Static variables are declared using the 'static' keyword.

  • They are initialized only once, at the start of the program.

  • They can be accessed directly using the class name, without creating an instance of the class.

  • Changes made to a static variable are reflected in all instances of the class.

  • Static variables are commonly used for constants or to keep track of global st...read more

View 2 more answers

Q47. Tell about P2P cycle in details?

Ans.

P2P cycle is the process of procuring goods or services from a vendor and paying for them.

  • The cycle starts with creating a purchase requisition

  • The purchase requisition is then converted into a purchase order

  • Goods or services are received and inspected

  • Invoice is received and matched with the purchase order and goods receipt

  • Payment is made to the vendor

  • The cycle ends with closing the purchase order

View 9 more answers

Q48. How to handle option values in swift

Ans.

Option values in Swift can be handled using enums, switch statements, and optional binding.

  • Use enums to define a set of possible values for an option

  • Use switch statements to handle each possible value of the option

  • Use optional binding to safely unwrap optional values

Add your answer

Q49. How to do API using service manager

Ans.

APIs can be created using Service Manager by defining endpoints and methods for interacting with the service.

  • Define the API endpoints and methods in the Service Manager configuration.

  • Implement the logic for handling API requests and responses.

  • Test the API endpoints using tools like Postman to ensure functionality.

  • Secure the API by implementing authentication and authorization mechanisms.

Add your answer

Q50. What is merge Sort? Write the code?

Ans.

Merge Sort is a divide and conquer algorithm that sorts an array by dividing it into two halves, sorting them separately, and then merging the results.

  • Divide the array into two halves

  • Recursively sort the two halves

  • Merge the sorted halves

  • Repeat until the entire array is sorted

Add your answer

Q51. What are new features in angular13?

Ans.

Angular 13 is not released yet, so there are no new features to discuss.

  • Angular 13 has not been released yet

  • No official information on new features available

Add your answer

Q52. What is lazy loading in angular ?

Ans.

Lazy loading in Angular is a technique used to load modules only when they are required, improving performance by reducing initial load time.

  • Lazy loading helps in reducing the initial bundle size of the application.

  • It allows for faster loading times as only the required modules are loaded when needed.

  • Lazy loading is achieved by using the loadChildren property in the route configuration of Angular modules.

  • Example: loadChildren: () => import('./lazy-loaded-module').then(m => m....read more

Add your answer

Q53. What do you understand by AAA ?

Ans.

AAA stands for Authentication, Authorization, and Accounting.

  • Authentication: verifying the identity of a user or device

  • Authorization: granting access to specific resources or actions

  • Accounting: tracking and recording usage of resources for billing or auditing purposes

Add your answer

Q54. How VPN works

Ans.

VPN stands for Virtual Private Network. It allows secure remote access to a private network over the internet.

  • VPN creates a secure and encrypted connection between the user's device and the private network.

  • It masks the user's IP address and location, providing anonymity and privacy.

  • VPN uses different protocols such as PPTP, L2TP, IPSec, and OpenVPN.

  • It can be used to access geographically restricted content, bypass censorship, and protect against cyber threats.

  • VPN can be set u...read more

Add your answer

Q55. What is VTP

Ans.

VTP stands for VLAN Trunking Protocol, used to manage VLANs in a switched network.

  • VTP is a Cisco proprietary protocol.

  • It allows for easy VLAN management by propagating VLAN information across the network.

  • VTP operates in three modes: server, client, and transparent.

  • Server mode allows for VLAN creation, deletion, and modification.

  • Client mode receives and stores VLAN information.

  • Transparent mode forwards VTP messages but does not participate in VTP updates.

  • VTP version 3 introduc...read more

Add your answer

Q56. Probability for to pick a gold ball out of 100balls

Ans.

The probability of picking a gold ball out of 100 balls is 1%

  • The probability is calculated by dividing the number of gold balls by the total number of balls

  • Assuming there is only one gold ball, the probability is 1/100 or 0.01

  • If there are multiple gold balls, the probability will be higher

Add your answer

Q57. Which version of Angular have you used

Ans.

I have used Angular 2, 4, 5, 6, 7, 8, 9, and 10.

  • I have experience in developing web applications using Angular 2 and above.

  • I have worked on Angular projects with various versions including 4, 5, 6, 7, 8, 9, and 10.

  • I am familiar with the latest features and updates in Angular 10.

  • I have used Angular CLI for creating and managing Angular projects.

  • I have experience in implementing Angular Material design components.

  • I have worked on projects that involve integrating Angular with b...read more

Add your answer

Q58. What is Angular and it's advantages

Ans.

Angular is a popular front-end framework developed by Google for building dynamic web applications.

  • Angular is based on TypeScript, a superset of JavaScript, which adds static typing and other features to the language.

  • It follows the MVC (Model-View-Controller) architecture, making it easier to organize code and separate concerns.

  • Angular provides two-way data binding, which allows changes in the model to be automatically reflected in the view and vice versa.

  • It offers a rich set...read more

Add your answer

Q59. Difference between public ,private and protected in java

Ans.

In Java, public, private, and protected are access modifiers used to control the visibility of classes, methods, and variables.

  • public: accessible from any other class

  • private: accessible only within the same class

  • protected: accessible within the same package and subclasses

  • Example: public class MyClass {}

  • Example: private int myVar;

  • Example: protected void myMethod() {}

Add your answer

Q60. How to save and load ML model weights?

Ans.

ML model weights can be saved and loaded using serialization libraries like pickle or joblib.

  • Use serialization libraries like pickle or joblib to save and load model weights.

  • For saving weights: model.save_weights('model_weights.h5')

  • For loading weights: model.load_weights('model_weights.h5')

Add your answer

Q61. What is eventloop in nodejs?

Ans.

Eventloop is a mechanism in Node.js that allows non-blocking I/O operations to be performed efficiently.

  • Eventloop is responsible for handling asynchronous callbacks in Node.js

  • It continuously checks the event queue for new events to process

  • It executes the callbacks in the event queue in a non-blocking manner

  • It allows Node.js to handle multiple requests simultaneously

  • It is a key feature that makes Node.js highly scalable

Add your answer

Q62. What is polymorphism and OOPs concept

Ans.

Polymorphism is the ability of a single function or method to operate on different data types. OOPs concept refers to Object-Oriented Programming principles like inheritance, encapsulation, and abstraction.

  • Polymorphism allows a function to take different forms based on the input data type.

  • OOPs concept includes inheritance, where a class can inherit properties and methods from another class.

  • Encapsulation involves bundling data and methods that operate on the data into a single...read more

Add your answer

Q63. What is super class?

Ans.

A super class is a class that is inherited by other classes, providing them with common attributes and behaviors.

  • Super class is also known as a base class or parent class.

  • It serves as a blueprint for creating derived classes.

  • Derived classes inherit the properties and methods of the super class.

  • Super class can be extended or overridden by the derived classes.

  • Super class promotes code reusability and modularity.

  • Example: In a vehicle hierarchy, 'Vehicle' can be a super class wit...read more

View 2 more answers

Q64. How do you resolve a production issue?

Ans.

I follow a systematic approach by identifying the root cause, implementing a temporary fix if needed, testing the solution, and documenting the resolution.

  • Identify the root cause of the issue

  • Implement a temporary fix if necessary to restore production

  • Test the solution to ensure it resolves the issue

  • Document the resolution for future reference

Add your answer

Q65. What is procedure in plsql and it's syntax and difference between procedure and function?

Ans.

A procedure in PL/SQL is a named block of code that can be called and executed multiple times.

  • Syntax: CREATE [OR REPLACE] PROCEDURE procedure_name [(parameter1 [mode1] datatype1 [, parameter2 [mode2] datatype2]...)] IS

  • Difference between procedure and function: Procedures do not return a value, while functions return a value.

  • Procedures are used to perform an action, while functions are used to calculate and return a value.

  • Procedures can have OUT or IN OUT parameters to pass va...read more

View 6 more answers

Q66. What is Android framework architecture

Ans.

Android framework architecture is a set of APIs provided by the Android SDK to support the development of applications on the Android platform.

  • Consists of various layers such as application framework, libraries, runtime, and Linux kernel

  • Provides developers with tools and APIs to build and interact with applications

  • Includes components like Activity Manager, Content Providers, View System, and Package Manager

Add your answer

Q67. What is temp table and temp variable in plsql?

Ans.

Temp table is a table created temporarily in memory. Temp variable is a variable that holds temporary data.

  • Temp table is used to store data temporarily during a session

  • Temp variable is used to hold temporary data that is not needed after a certain point

  • Temp table and variable are created using the 'CREATE GLOBAL TEMPORARY' and 'DECLARE' statements respectively

  • Example: CREATE GLOBAL TEMPORARY TABLE temp_table (id NUMBER, name VARCHAR2(50));

  • Example: DECLARE temp_var VARCHAR2(50...read more

View 5 more answers

Q68. 1. What is JDK, JVM, JRE.

Ans.

JDK is a development kit, JRE is a runtime environment, and JVM is a virtual machine for executing Java code.

  • JDK includes JRE and development tools like javac and java

  • JRE includes JVM and necessary libraries to run Java applications

  • JVM is responsible for interpreting Java bytecode and executing it

  • Example: JDK 8 includes JRE 8 and development tools like javac and java

  • Example: JRE 8 includes JVM 8 and necessary libraries to run Java applications

View 13 more answers

Q69. Tell me the life cycle of mvc

Ans.

MVC life cycle involves request handling, routing, controller execution, view rendering, and response generation.

  • Client sends a request to the server

  • Routing maps the request to a specific controller

  • Controller executes the requested action and interacts with the model

  • View is rendered with the data from the model

  • Response is generated and sent back to the client

Add your answer

Q70. What is pandas and how to use

Ans.

pandas is a Python library used for data manipulation and analysis.

  • pandas provides data structures like DataFrame and Series for handling data

  • It can read and write data from various file formats like CSV, Excel, SQL databases

  • pandas allows for data cleaning, filtering, grouping, and merging operations

  • Example: df = pd.read_csv('data.csv') creates a DataFrame from a CSV file

Add your answer

Q71. write a program to show patterns

Ans.

Program to display patterns using arrays of strings

  • Use nested loops to iterate through rows and columns of the array

  • Fill the array with characters to create the desired pattern

  • Print each row of the array to display the pattern

Add your answer

Q72. Python coad to find 2nd largest number in arrey

Ans.

Python code to find the 2nd largest number in an array.

  • Sort the array in descending order

  • Return the element at index 1

Add your answer

Q73. Tell about cyber security?

Ans.

Cyber security refers to the practice of protecting computer systems, networks, and sensitive information from unauthorized access, theft, or damage.

  • Cyber security involves implementing measures to prevent cyber attacks and data breaches.

  • It includes using firewalls, antivirus software, and encryption to protect systems and data.

  • Cyber security also involves educating users about safe online practices and implementing policies and procedures to ensure security.

  • Examples of cyber...read more

Add your answer

Q74. What is the significance of vendor account group?

Ans.

Vendor account group determines the fields that are mandatory for a vendor master record.

  • Vendor account group is used to group vendors based on certain criteria such as payment terms, delivery time, etc.

  • It determines the fields that are mandatory for a vendor master record.

  • It also determines the number range for vendor account codes.

  • For example, a vendor account group can be created for domestic vendors and another for international vendors.

  • Each vendor account group can have ...read more

View 10 more answers

Q75. Write a code on bubble sort in c?

Ans.

Bubble sort is a simple sorting algorithm that repeatedly steps through the list, compares adjacent elements and swaps them if they are in the wrong order.

  • Initialize an array of strings to be sorted

  • Use nested loops to compare adjacent elements and swap them if necessary

  • Repeat the process until the array is sorted

Add your answer

Q76. What is grep in Linux?

Ans.

Grep is a command-line utility in Linux used to search for specific patterns in text files.

  • Grep stands for 'Global Regular Expression Print'.

  • It is used to search for a specific pattern in one or more files.

  • Grep can be used with regular expressions to perform complex pattern matching.

  • Example: grep 'search_term' file.txt

  • Example: grep -i 'pattern' file1.txt file2.txt

Add your answer

Q77. Introduction project details why IT coding

Ans.

I have experience working on various IT projects involving coding, which is why I am interested in the System Engineer role.

  • I have worked on multiple IT projects where I was responsible for coding and system engineering tasks.

  • I am passionate about IT and enjoy the challenge of problem-solving through coding.

  • I believe that my coding skills and experience make me a strong candidate for the System Engineer position.

Add your answer

Q78. What is IAM? What is AD?

Ans.

IAM stands for Identity and Access Management. AD stands for Active Directory.

  • IAM is a framework for managing digital identities and controlling access to resources.

  • AD is a Microsoft product that provides directory services, authentication, and authorization.

  • IAM and AD are often used together to manage user access to resources in an organization.

  • IAM solutions include Okta, OneLogin, and Azure AD.

  • AD is commonly used in Windows environments to manage user accounts, computers, a...read more

Add your answer

Q79. What is MVC? How it works

Ans.

MVC stands for Model-View-Controller. It is a software design pattern used to separate an application's concerns.

  • Model represents the data and business logic

  • View displays the data to the user

  • Controller handles user input and updates the model and view accordingly

  • MVC promotes separation of concerns and modularity

  • Examples include Ruby on Rails, ASP.NET MVC, and Spring MVC

Add your answer

Q80. What is Java and spring boot ?

Ans.

Java is a popular programming language used for developing various applications. Spring Boot is a framework that simplifies the development of Java-based applications.

  • Java is an object-oriented programming language known for its portability and versatility.

  • Spring Boot is a framework that simplifies the development of Java-based applications by providing pre-configured settings and tools.

  • Spring Boot allows developers to quickly set up and run standalone Spring-based applicatio...read more

Add your answer

Q81. Real life examples of Data Structure

Ans.

Data structures are used in various real-life scenarios to organize and manage data efficiently.

  • Phone contacts stored in a hash table for quick access

  • Employee records stored in a linked list for easy insertion and deletion

  • File system organized as a tree structure for hierarchical storage

Add your answer

Q82. Tell me about your current project. Difference between managed and external table. Architecture of spark. What is RDD. Characteristics of RDD. Meaning of lazy nature. Insert statement for managed and external t...

read more
Ans.

Interview questions for a PySpark Developer

  • Explained current project and its implementation

  • Differentiated between managed and external table

  • Described Spark architecture and RDD

  • Discussed characteristics of RDD and lazy nature

  • Provided insert statement for managed and external table

  • Explained deployment related to code in PySpark

  • Answered Python related questions

  • Explained how to convince manager/scrum master for code changes

  • Discussed team size and management

Add your answer

Q83. What is Array and String

Ans.

An array is a data structure that stores a collection of elements of the same type. A string is a sequence of characters.

  • Arrays can be one-dimensional, two-dimensional, or multi-dimensional.

  • Strings are typically used to represent text and are enclosed in quotation marks.

  • Arrays and strings are both commonly used in programming languages.

  • Example of an array: [1, 2, 3, 4, 5]

  • Example of a string: 'Hello, World!'

Add your answer

Q84. What's SQL and why we use it?

Ans.

SQL is a programming language used for managing and manipulating relational databases.

  • SQL stands for Structured Query Language

  • It is used to communicate with databases to perform tasks such as querying data, updating data, and creating databases

  • Examples of SQL commands include SELECT, INSERT, UPDATE, DELETE

  • SQL is essential for managing large amounts of data efficiently

Add your answer

Q85. What is new in Java 11

Ans.

Java 11 introduces new features like local variable type inference, HTTP client API, and Epsilon garbage collector.

  • Local variable type inference allows the compiler to infer the type of a local variable based on its initializer.

  • HTTP client API provides a standard API for making HTTP requests and handling responses.

  • Epsilon garbage collector is a no-op garbage collector that can be used for performance testing and short-lived applications.

  • Other features include Unicode 10 suppo...read more

Add your answer

Q86. Mail flow in on premise and o365 environment

Ans.

Mail flow in on-premise and O365 environment

  • In on-premise environment, mail flow is managed by Exchange servers installed on-premises

  • In O365 environment, mail flow is managed by Exchange Online Protection (EOP) and Exchange Online servers

  • In a hybrid environment, mail flow can be managed by both on-premise Exchange servers and EOP/Exchange Online servers

  • Mail flow can be configured using connectors, transport rules, and mail flow policies

Add your answer

Q87. How to handal application

Ans.

Handling applications involves monitoring, troubleshooting, and optimizing performance.

  • Monitor application performance regularly to identify any issues or bottlenecks

  • Troubleshoot any errors or bugs that arise in the application

  • Optimize the application by fine-tuning configurations and resources

  • Implement security measures to protect the application from threats

  • Document changes and updates made to the application for future reference

Add your answer

Q88. what is oops and its feature

Ans.

OOPs stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.

  • OOPs features include encapsulation, inheritance, polymorphism, and abstraction.

  • Encapsulation refers to the bundling of data with the methods that operate on that data.

  • Inheritance allows classes to inherit attributes and methods from other classes.

  • Polymorphism allows objects to be treated as ...read more

Add your answer

Q89. Explain oops concepts with an example

Ans.

Explanation of OOPs concepts with an example

  • OOPs stands for Object-Oriented Programming

  • Encapsulation - Binding data and functions that manipulate the data together

  • Inheritance - A class can inherit properties and methods from another class

  • Polymorphism - Ability of an object to take many forms

  • Abstraction - Hiding implementation details and showing only functionality

  • Example: A car is an object that has properties like color, model, and methods like start, stop, accelerate

  • Encapsu...read more

View 7 more answers
Q90. Search an Element in an Array

You have given a sorted array 'A' of 'N' integers.

Now, you are given 'Q' queries, and each query consists of a single integer 'X'. Your task is to check whether 'X' is present in a...read more

View 4 more answers

Q91. 1. What is interface how to use? 2. Tell me a small example for interface? 3. How to managing the Error Logging system at your application 4. How you implement Security at your application 5. What are the Joins...

read more
Ans.

Answering questions related to IT Analyst position

  • An interface is a contract between two objects that defines the communication between them

  • An example of an interface is the Java interface, which defines a set of methods that a class must implement

  • Error logging can be managed by setting up a system to capture and store error messages, and regularly reviewing and addressing them

  • Security can be implemented through measures such as authentication, authorization, encryption, and ...read more

Add your answer

Q92. What is a database management System and what is concept of primary key and foreign key?

Ans.

A database management system (DBMS) is a software that manages and organizes databases. Primary key uniquely identifies a record, while foreign key establishes a relationship between tables.

  • A DBMS is a software that allows users to create, manage, and manipulate databases.

  • It provides tools for creating, modifying, and deleting databases, tables, and records.

  • Primary key is a unique identifier for a record in a table.

  • Foreign key establishes a relationship between two tables by ...read more

View 7 more answers
Q93. Search in a Linked List

You are given a Singly Linked List of integers with a head pointer. Every node of the Linked List has a value written on it.

A sample Linked List

Sample Linked List

Now you have been given an integer value...read more

View 3 more answers

Q94. Difference in .net framework and core

Ans.

The .NET Framework is a traditional framework for Windows applications, while .NET Core is a cross-platform, open-source framework.

  • The .NET Framework is primarily for Windows applications, while .NET Core is cross-platform and can run on Windows, macOS, and Linux.

  • The .NET Framework is closed-source, while .NET Core is open-source.

  • The .NET Framework is not modular, while .NET Core is modular and allows developers to include only the necessary components in their applications.

  • T...read more

Add your answer

Q95. How does YOLO algorithm works?

Ans.

YOLO (You Only Look Once) algorithm is a real-time object detection system that processes images in a single pass.

  • YOLO divides the image into a grid and predicts bounding boxes and probabilities for each grid cell.

  • It uses a single neural network to predict multiple bounding boxes and class probabilities simultaneously.

  • YOLO is known for its speed and accuracy in object detection tasks.

  • Example: YOLO can detect objects like cars, people, and animals in images or videos.

Add your answer

Q96. What is HSIT?

Ans.

HSIT stands for Hardware and Software Integration Testing.

  • HSIT is a type of testing that verifies the compatibility and functionality of hardware and software components.

  • It is usually performed after unit testing and before system testing.

  • HSIT can help identify any issues with the integration of hardware and software, such as driver conflicts or compatibility issues.

  • Examples of HSIT include testing the compatibility of a new graphics card with existing software or testing the...read more

Add your answer

Q97. What is MC/DC?

Ans.

MC/DC stands for Modified Condition/Decision Coverage, a testing technique used to ensure that each condition in a decision statement is tested independently.

  • MC/DC is a type of coverage criteria used in software testing.

  • It ensures that each condition in a decision statement is tested independently.

  • It requires that each condition be shown to independently affect the outcome of the decision.

  • MC/DC is commonly used in safety-critical systems such as aviation and medical devices.

  • A...read more

Add your answer

Q98. What is Singleton class. What is the use of singleton class

Ans.

Singleton class is a class that can only have one instance at a time.

  • It is used to ensure that there is only one instance of a class in the system.

  • It is often used in situations where a single object needs to coordinate actions across the system.

  • Example: Database connection class, logger class, configuration class.

  • It can be implemented using private constructors, static methods, and static variables.

View 1 answer

Q99. Explain Android AIDL Communication

Ans.

Android AIDL Communication is a mechanism for inter-process communication between Android components.

  • AIDL stands for Android Interface Definition Language

  • It allows different Android components to communicate with each other across different processes

  • AIDL files define the interface that the client and server components will use to communicate

  • AIDL is commonly used for communication between activities, services, and content providers

Add your answer

Q100. Explain different types of polymorphism.

Ans.

Polymorphism in programming refers to the ability of a single function or method to operate on different types of data.

  • Compile-time polymorphism (static binding): achieved using function overloading and operator overloading

  • Run-time polymorphism (dynamic binding): achieved using function overriding and virtual functions

  • Ad-hoc polymorphism: achieved using templates or generics

  • Parametric polymorphism: achieved using inheritance and interfaces

Add your answer
1
2
3
4
5
6
7
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Innovatiview India Ltd

based on 4.2k interviews in the last 1 year
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.3
 • 479 Interview Questions
3.8
 • 384 Interview Questions
4.2
 • 177 Interview Questions
4.2
 • 143 Interview Questions
3.7
 • 136 Interview Questions
4.1
 • 134 Interview Questions
View all
Top TCS Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter