Add office photos
Employer?
Claim Account for FREE

TCS iON

3.9
based on 1.3k Reviews
Video summary
Filter interviews by

200+ Salesforce Interview Questions and Answers

Updated 27 Feb 2025
Popular Designations

Q101. Exception handling in java

Ans.

Exception handling in Java is a mechanism to handle runtime errors and prevent program crashes.

  • Use try-catch blocks to handle exceptions

  • Use finally block to execute code regardless of exception

  • Use throw keyword to manually throw exceptions

  • Use throws keyword in method signature to declare exceptions that can be thrown

Add your answer

Q102. How do you configure MySQL database ?

Ans.

MySQL database can be configured using configuration files like my.cnf, command line options, and environment variables.

  • Use my.cnf file to configure settings like port number, data directory, and buffer sizes

  • Command line options can be used to override settings from my.cnf file

  • Environment variables like MYSQL_ROOT_PASSWORD can be used to set passwords during installation

Add your answer

Q103. what is linked list, write program for it

Ans.

A linked list is a data structure where each element points to the next element in the sequence.

  • Linked list is made up of nodes, each containing data and a reference to the next node.

  • Example: Node 1 -> Node 2 -> Node 3

  • Program to create a linked list in Python: class Node: def __init__(self, data=None): self.data = data self.next = None

Add your answer

Q104. What is array, string, memory allocation

Ans.

Array is a collection of elements of the same data type. String is a sequence of characters. Memory allocation is the process of reserving space in memory for variables.

  • Array: int numbers[5] = {1, 2, 3, 4, 5};

  • String: char name[] = 'John';

  • Memory allocation: int *ptr = (int*)malloc(5 * sizeof(int));

Add your answer
Discover Salesforce interview dos and don'ts from real experiences

Q105. What is clss

Ans.

Class is a blueprint for creating objects in object-oriented programming.

  • A class defines a set of attributes and methods that an object can have.

  • Objects are instances of a class.

  • Classes can inherit attributes and methods from other classes.

  • Encapsulation, inheritance, and polymorphism are key concepts in OOP.

  • Example: class Car { String make; int year; void start() { ... } }

Add your answer

Q106. What is inheritance

Ans.

Inheritance is a mechanism in object-oriented programming where a new class is created by inheriting properties of an existing class.

  • Inheritance allows code reuse and promotes code organization.

  • The existing class is called the parent or superclass, and the new class is called the child or subclass.

  • The child class can access all the public and protected methods and variables of the parent class.

  • The child class can also override the methods of the parent class to provide its ow...read more

Add your answer
Are these interview questions helpful?

Q107. What is distructor

Ans.

Destructor is a special member function that gets called automatically when an object is destroyed.

  • It is used to release resources that were acquired by the object during its lifetime.

  • It has the same name as the class preceded by a tilde (~).

  • It cannot have any parameters or a return type.

  • Example: ~MyClass() {}

  • It is called automatically when an object goes out of scope or is explicitly deleted.

Add your answer

Q108. What is interface

Ans.

An interface is a contract that specifies the methods that a class must implement.

  • Interfaces define a set of methods that a class must implement.

  • Classes can implement multiple interfaces.

  • Interfaces can be used to achieve polymorphism.

  • Interfaces are declared using the 'interface' keyword.

  • Example: 'public interface MyInterface { void myMethod(); }'

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q109. What is jvm

Ans.

JVM stands for Java Virtual Machine. It is a virtual machine that executes Java bytecode.

  • JVM is responsible for running Java programs by interpreting bytecode.

  • It provides platform independence by executing bytecode on different operating systems.

  • JVM manages memory, performs garbage collection, and optimizes code execution.

  • It consists of various components like class loader, bytecode verifier, interpreter, and just-in-time compiler.

  • Examples of JVM implementations include Oracl...read more

View 1 answer

Q110. How do you Sell a pen to me?

Ans.

I would highlight the pen's unique features and benefits to show how it can meet your needs.

  • This pen has a sleek design that is both stylish and professional.

  • It writes smoothly and effortlessly, making it perfect for everyday use.

  • The ink is long-lasting and won't smudge or smear, ensuring your writing stays neat and tidy.

  • It's also refillable, so you can use it for years to come and save money on buying new pens.

  • Overall, this pen is a reliable and practical choice for anyone w...read more

Add your answer

Q111. Defination of pharmacovigilace,its aim ,adverse drug event defination

Ans.

Pharmacovigilance is the science and activities related to the detection, assessment, understanding, and prevention of adverse effects or any other drug-related problems.

  • Pharmacovigilance aims to improve patient safety by monitoring and evaluating the safety of medications.

  • Adverse drug event is any untoward medical occurrence that may present during treatment with a pharmaceutical product but which does not necessarily have a causal relationship with this treatment.

  • The main g...read more

Add your answer

Q112. Is it ok for Reallocation

Ans.

Yes, reallocation is acceptable in certain situations to optimize resources.

  • Reallocation can be acceptable if it helps optimize resources and improve efficiency.

  • For example, reallocating server resources to handle increased traffic during peak hours.

  • Reallocation should be carefully planned and executed to avoid negative impacts on system performance.

  • Regular monitoring and evaluation of the reallocated resources is important to ensure effectiveness.

Add your answer

Q113. Difference between multiprogramming and multitasking.

Ans.

Multiprogramming involves running multiple programs on a single processor, while multitasking involves executing multiple tasks within a single program.

  • Multiprogramming allows multiple programs to be loaded into memory and executed concurrently, while multitasking involves switching between multiple tasks within a single program.

  • In multiprogramming, the operating system decides which program gets the processor's attention at any given time, while in multitasking, the program ...read more

Add your answer

Q114. Creating custom node programmatically

Ans.

Creating custom nodes programmatically involves defining the node class, implementing the necessary functionality, and adding it to the system.

  • Define a new class for the custom node

  • Implement the desired functionality within the class

  • Add the custom node to the system programmatically

Add your answer

Q115. What is data structure ?

Ans.

Data structure is a way of organizing and storing data in a computer so that it can be accessed and used efficiently.

  • Data structure is a collection of data values, the relationships among them, and the functions or operations that can be applied to the data.

  • Examples of data structures include arrays, linked lists, stacks, queues, trees, graphs, and hash tables.

  • Choosing the right data structure for a particular task is important for efficient and effective programming.

  • Data str...read more

Add your answer

Q116. What is cloud computing

Ans.

Cloud computing is the delivery of computing services over the internet, including servers, storage, databases, networking, software, analytics, and intelligence.

  • Allows users to access and store data and applications on remote servers instead of on their local devices

  • Provides flexibility, scalability, and cost-effectiveness for businesses

  • Examples include Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform

Add your answer

Q117. What is react virtual dom

Ans.

React virtual DOM is a lightweight copy of the actual DOM, used for efficient updates and rendering in React applications.

  • Virtual DOM is a concept where a lightweight copy of the actual DOM is created and updated by React.

  • React compares the virtual DOM with the actual DOM and only updates the necessary parts for efficiency.

  • This helps in faster rendering and updates in React applications.

Add your answer

Q118. Explain stream api and lambda expression

Ans.

Stream API is a set of classes in Java that allow processing collections of objects in a functional style. Lambda expressions are used to write concise code for functional interfaces.

  • Stream API provides a way to perform operations on collections like filter, map, reduce, etc.

  • Lambda expressions are used to define anonymous functions in a concise way.

  • Example: List<String> names = Arrays.asList("Alice", "Bob", "Charlie"); names.stream().filter(name -> name.startsWith("A")).forEa...read more

Add your answer

Q119. Encapsulation with an example?

Ans.

Encapsulation is the concept of bundling data and methods that operate on the data into a single unit.

  • Encapsulation helps in hiding the internal state of an object and restricting access to it.

  • It allows for better control over the data by preventing external code from directly modifying it.

  • Example: A class 'Car' with private variables like 'model', 'year', and public methods like 'getYear()' and 'setModel()'.

Add your answer

Q120. Difference between multi-programming and multi-tasking.

Ans.

Multi-programming involves running multiple programs on a single processor, while multi-tasking involves running multiple tasks within a single program.

  • Multi-programming allows multiple programs to be loaded into memory and executed concurrently, switching between them to utilize processor time efficiently.

  • Multi-tasking allows a single program to perform multiple tasks simultaneously, such as running multiple threads or processes within the program.

  • Examples of multi-programmi...read more

Add your answer

Q121. Why you choose linux? What is rpm &amp; yum?

Ans.

I chose Linux because of its stability, security, and flexibility. RPM is a package manager used in Red Hat-based distributions, while Yum is a command-line package management utility.

  • I chose Linux because it is an open-source operating system that offers better stability and security compared to other options.

  • Linux provides a high level of flexibility, allowing me to customize and optimize the system according to specific needs.

  • RPM (Red Hat Package Manager) is a package mana...read more

Add your answer

Q122. What is oops in java

Ans.

Object-oriented programming concepts in Java

  • OOPs stands for Object-Oriented Programming

  • Key concepts include classes, objects, inheritance, polymorphism, encapsulation

  • Java is an OOP language with support for these concepts

  • Example: Class Car with properties like make, model and methods like drive()

Add your answer

Q123. what is OPPS concept

Ans.

OPPS stands for Object-Oriented Programming System. It is a programming paradigm that uses objects to represent real-world entities.

  • OPPS focuses on the concept of objects and classes.

  • It emphasizes encapsulation, inheritance, and polymorphism.

  • Objects have attributes (data) and behaviors (methods).

  • Classes are blueprints for creating objects.

  • Encapsulation hides the internal details of an object.

  • Inheritance allows classes to inherit properties and methods from other classes.

  • Polym...read more

View 1 answer

Q124. What is bundling

Ans.

Bundling is the process of combining multiple files or resources into a single file for more efficient delivery.

  • Bundling helps reduce the number of HTTP requests needed to load a web page.

  • It can improve performance by reducing latency and bandwidth usage.

  • Common tools for bundling in web development include Webpack and Parcel.

Add your answer

Q125. What is minification

Ans.

Minification is the process of removing unnecessary characters from code without affecting its functionality.

  • Minification reduces file size by removing comments, whitespace, and renaming variables.

  • It helps improve website loading speed and performance.

  • Example: Minified JavaScript code: var x=document.getElementById('demo');x.innerHTML='Hello World';

Add your answer

Q126. What is embedded systems

Ans.

Embedded systems are specialized computing systems designed to perform specific tasks within a larger system.

  • Embedded systems are typically designed to be low-cost and low-power.

  • They are often used in consumer electronics, automotive systems, industrial machines, and medical devices.

  • Examples of embedded systems include microcontrollers in washing machines, automotive engine control units, and pacemakers.

  • They are programmed to perform specific functions and are usually not use...read more

Add your answer

Q127. What is microprocessors

Ans.

Microprocessors are integrated circuits that serve as the central processing unit in computers and other electronic devices.

  • Microprocessors are responsible for executing instructions and performing calculations in electronic devices.

  • They are made up of millions of tiny components packed into a single chip.

  • Examples of microprocessors include Intel's Core series, AMD's Ryzen series, and ARM processors used in smartphones and tablets.

Add your answer

Q128. Difference between rest and soap webservices

Ans.

REST is lightweight and uses HTTP while SOAP is XML-based and has a standardized protocol.

  • REST is stateless while SOAP is stateful

  • REST supports multiple formats like JSON, XML, etc. while SOAP only supports XML

  • REST is faster and easier to use while SOAP is more secure and reliable

  • REST is used for mobile and web applications while SOAP is used for enterprise-level applications

  • Examples of RESTful APIs include Twitter, Google Maps, etc. while examples of SOAP APIs include eBay, ...read more

Add your answer

Q129. What is the query for insertion

Ans.

The query for insertion in a database table.

  • Use the INSERT INTO statement followed by the table name

  • Specify the columns you want to insert data into

  • Provide the values to be inserted for each column

  • Example: INSERT INTO employees (name, age) VALUES ('John Doe', 30)

Add your answer

Q130. What is diff between etl and elt

Ans.

ETL stands for Extract, Transform, Load while ELT stands for Extract, Load, Transform.

  • ETL involves extracting data from source systems, transforming it, and then loading it into the target system.

  • ELT involves extracting data from source systems, loading it into the target system, and then transforming it as needed.

  • ETL is suitable for scenarios where data needs to be transformed before loading, while ELT is useful when raw data needs to be loaded first and then transformed.

  • ETL...read more

Add your answer

Q131. What is java and its classified

Ans.

Java is a high-level programming language known for its portability, security, and versatility.

  • Java is classified as an object-oriented programming language.

  • It is platform-independent, meaning it can run on any device with a Java Virtual Machine (JVM).

  • Java is used for developing a wide range of applications, from mobile apps to enterprise software.

  • It is known for its strong security features, making it popular for building secure applications.

  • Java is constantly evolving with ...read more

Add your answer
Asked in
SDE Interview

Q132. What is 1+1?

Ans.

The sum of 1 and 1 is 2.

  • The addition of two numbers results in their sum.

  • In this case, 1 plus 1 equals 2.

View 1 answer

Q133. what is an array?

Ans.

An array is a data structure that stores a collection of elements of the same type in a contiguous block of memory.

  • Arrays can be accessed using an index starting from 0.

  • They have a fixed size, which is determined at the time of declaration.

  • Arrays can store elements of any data type, including strings.

  • Example: ['apple', 'banana', 'orange']

View 1 answer

Q134. How to run python file

Ans.

To run a Python file, use the command 'python filename.py' in the terminal.

  • Open the terminal or command prompt

  • Navigate to the directory where the Python file is located

  • Run the command 'python filename.py' to execute the file

Add your answer

Q135. Code for sorting algo

Ans.

Code for sorting an array of strings

  • Use a sorting algorithm like bubble sort, insertion sort, or merge sort

  • Compare strings using a comparison function

  • Repeat the sorting process until the array is sorted

Add your answer

Q136. What is flutter

Ans.

Flutter is a UI toolkit for building natively compiled applications for mobile, web, and desktop from a single codebase.

  • Developed by Google

  • Uses Dart programming language

  • Hot reload feature for quick development

  • Supports iOS, Android, Web, and Desktop platforms

  • Provides a rich set of pre-built widgets

Add your answer

Q137. What is SDLC and its phases

Ans.

SDLC stands for Software Development Life Cycle, which is a process used to design, develop, and test software.

  • SDLC consists of several phases including planning, analysis, design, implementation, testing, and maintenance.

  • Each phase has its own set of activities and deliverables that must be completed before moving on to the next phase.

  • The planning phase involves defining the project scope, objectives, and requirements.

  • The analysis phase involves gathering and analyzing user ...read more

Add your answer

Q138. What is black box testing?

Ans.

Black box testing is a method of software testing that examines the functionality of an application without knowing its internal code.

  • Tests are performed based on the input and output of the application

  • It is also known as functional testing

  • Testers do not have access to the source code

  • It focuses on the user's perspective

  • Examples include GUI testing, regression testing, and acceptance testing

Add your answer

Q139. What do you know about tcs

Ans.

TCS is a global IT services, consulting and business solutions organization.

  • TCS stands for Tata Consultancy Services

  • It is headquartered in Mumbai, India

  • It is one of the largest IT services companies in the world

  • TCS offers a wide range of services including application development, infrastructure management, and business process outsourcing

  • It has a presence in over 46 countries and serves clients in various industries such as banking, healthcare, and retail

Add your answer

Q140. Reverse Array of sorted

Ans.

Reverse the order of elements in a sorted array of strings.

  • Iterate through the array from both ends and swap elements until reaching the middle.

  • Use a temporary variable to store the value of the element being swapped.

  • Example: Input array ['apple', 'banana', 'cherry', 'date'] should be reversed to ['date', 'cherry', 'banana', 'apple'].

Add your answer

Q141. Give me unique values in a column (sql)

Ans.

Use the DISTINCT keyword in SQL to retrieve unique values in a column.

  • Use the SELECT DISTINCT statement followed by the column name to retrieve unique values.

  • For example, SELECT DISTINCT column_name FROM table_name;

  • You can also use GROUP BY to get unique values in a column.

Add your answer

Q142. Swap 2 numbers without 3rd variable

Ans.

To swap two numbers without a third variable, use arithmetic operations.

  • Use addition and subtraction to swap the numbers

  • Example: a = 5, b = 10. a = a + b (a = 15), b = a - b (b = 5), a = a - b (a = 10)

Add your answer

Q143. Why tcs after a long gap

Ans.

TCS offers a challenging work environment and opportunities for growth after a long gap.

  • TCS is known for its diverse projects and cutting-edge technologies, providing a stimulating work environment.

  • After a long gap, I am eager to re-enter the workforce and TCS offers a platform for me to showcase my skills and expertise.

  • TCS has a strong reputation in the industry and I believe working here will help me enhance my career prospects.

Add your answer

Q144. Left side of Binary Tree

Ans.

The left side of a binary tree refers to all the nodes that are on the left side of the root node.

  • The left side of a binary tree can be accessed by traversing the tree starting from the root node and moving to the left child nodes.

  • Nodes on the left side of a binary tree have a lower value than the root node.

  • Example: In a binary tree with root node 5, left child node 3, and right child node 8, the left side consists of nodes with values 3 or lower.

Add your answer

Q145. Program to print fibanocci series

Ans.

A program to print the Fibonacci series using a loop or recursion.

  • Use a loop or recursion to generate the Fibonacci series

  • Start with 0 and 1 as the first two numbers in the series

  • Add the previous two numbers to get the next number in the series

Add your answer

Q146. What is IT contribution to GDP

Ans.

IT contributes significantly to GDP through technology innovation, productivity gains, and job creation.

  • IT sector directly contributes to GDP through sales of hardware, software, and services

  • IT enables productivity gains in other sectors by automating processes and improving efficiency

  • IT creates new job opportunities in tech companies and related industries

  • Examples: Apple's revenue from iPhone sales, Microsoft's software sales, Amazon's cloud computing services

Add your answer

Q147. What is vulnerability management

Ans.

Vulnerability management is the practice of identifying, classifying, prioritizing, and mitigating security vulnerabilities in systems and software.

  • Identifying vulnerabilities in systems and software

  • Classifying vulnerabilities based on severity

  • Prioritizing vulnerabilities based on risk level

  • Mitigating vulnerabilities through patches or other security measures

Add your answer

Q148. System problems in error

Ans.

System problems in error refer to issues or errors that occur within a computer system.

  • System problems can include hardware malfunctions, software bugs, network issues, and security breaches.

  • Troubleshooting system problems often involves identifying the root cause of the issue and implementing a solution.

  • Examples of system problems in error include blue screen errors, application crashes, slow performance, and connectivity issues.

Add your answer

Q149. Why we should use accounting

Ans.

Accounting helps in tracking financial transactions, analyzing business performance, and making informed decisions.

  • Provides insights into financial health of the organization

  • Helps in budgeting and forecasting

  • Ensures compliance with regulations and tax laws

  • Facilitates decision-making based on financial data

  • Helps in evaluating the profitability of products or services

Add your answer

Q150. What is the proxy server

Ans.

A proxy server acts as an intermediary between clients and servers, forwarding requests and responses.

  • Proxy servers can be used for caching, filtering, and improving security.

  • They can also be used to access restricted content by masking the user's IP address.

  • Examples of proxy servers include Squid, Apache mod_proxy, and Nginx.

Add your answer

Q151. What is the physical address

Ans.

Physical address is the location of a specific memory location in a computer's memory.

  • Physical address is a unique identifier for a specific memory location in a computer's memory

  • It is used by the hardware to access and retrieve data stored in that memory location

  • Physical addresses are typically represented in hexadecimal format

Add your answer

Q152. Explain Api testing

Ans.

API testing is a type of software testing that involves testing APIs directly and ensuring they meet functional and performance requirements.

  • API testing involves testing the functionality, reliability, performance, and security of APIs

  • API testing can be done manually or using automated tools

  • API testing can be done at different levels such as unit, integration, and end-to-end testing

  • API testing involves sending requests to the API and verifying the responses

  • API testing can als...read more

Add your answer

Q153. how to perform DB testing

Ans.

DB testing involves verifying data integrity, performance, security, and functionality of the database.

  • Verify data integrity by checking for data duplication, missing data, and data accuracy.

  • Test performance by measuring response time, throughput, and scalability.

  • Ensure security by testing access controls, encryption, and data privacy.

  • Test functionality by verifying data manipulation, retrieval, and storage.

  • Use SQL queries, stored procedures, and triggers to test the database...read more

Add your answer

Q154. Test case test plan difference

Ans.

Test case is a detailed step-by-step procedure to test a specific functionality, while test plan is a high-level document outlining testing approach and resources.

  • Test case is specific to a particular functionality or feature, while test plan is an overall strategy for testing the entire system.

  • Test case includes detailed steps, expected results, and actual results, while test plan includes objectives, scope, schedule, and resources.

  • Test case is executed by testers to validat...read more

Add your answer

Q155. SQL joins and there use

Ans.

SQL joins are used to combine rows from two or more tables based on a related column between them.

  • Types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN.

  • INNER JOIN returns rows when there is at least one match in both tables.

  • LEFT JOIN returns all rows from the left table and the matched rows from the right table.

  • RIGHT JOIN returns all rows from the right table and the matched rows from the left table.

  • FULL JOIN returns rows when there is a match in one of the ...read more

Add your answer

Q156. Wt is abstract clss

Ans.

An abstract class is a class that cannot be instantiated and is used as a base class for other classes.

  • An abstract class can have abstract and non-abstract methods.

  • Abstract methods have no implementation and must be implemented by the derived class.

  • An abstract class can have constructors, instance variables, and static methods.

  • An abstract class can be used to define a common interface for a group of related classes.

  • Example: Animal is an abstract class and Dog, Cat, and Bird a...read more

Add your answer

Q157. What is encapsulation in oops?

Ans.

Encapsulation is the concept of bundling data and methods that operate on the data into a single unit.

  • Encapsulation helps in hiding the internal state of an object and restricting access to it.

  • It allows for data hiding, which prevents direct access to an object's attributes.

  • Encapsulation also enables the concept of data abstraction, where only relevant details are exposed to the outside world.

  • By using access modifiers like private, protected, and public, encapsulation helps i...read more

Add your answer

Q158. Rotation of matrix by 45 degress

Ans.

To rotate a matrix by 45 degrees, transpose the matrix and then reverse the rows.

  • Transpose the matrix

  • Reverse the rows of the transposed matrix

Add your answer

Q159. What is osi model

Ans.

The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.

  • The OSI model stands for Open Systems Interconnection model.

  • It helps in understanding how different networking protocols work together.

  • Each layer has specific functions and communicates with the adjacent layers.

  • Examples of layers include physical layer, data link layer, network layer, transport layer, etc.

Add your answer

Q160. What is sql and database

Ans.

SQL is a programming language used to manage and manipulate data in relational databases.

  • SQL stands for Structured Query Language

  • It is used to communicate with databases to perform tasks like querying, updating, and deleting data

  • Common SQL commands include SELECT, INSERT, UPDATE, DELETE

  • Examples of popular databases that use SQL include MySQL, PostgreSQL, Oracle

Add your answer

Q161. Tell me about ur s3lf

Ans.

I am a dedicated and passionate individual with a strong interest in software development.

  • I have a Bachelor's degree in Computer Science from XYZ University.

  • I have completed internships at ABC Company and DEF Company, where I gained hands-on experience in developing applications.

  • I am proficient in programming languages such as Java, Python, and JavaScript.

  • I enjoy working in a team environment and collaborating with others to solve complex problems.

  • I am always eager to learn n...read more

Add your answer

Q162. what is data redundency

Ans.

Data redundancy refers to the unnecessary duplication of data in a database or system.

  • Data redundancy increases storage space and can lead to inconsistencies in data.

  • It can occur when the same data is stored in multiple locations.

  • Examples include storing a customer's address in both a customer table and an order table.

Add your answer

Q163. Array defintiion and uses

Ans.

An array is a data structure that stores a collection of elements of the same data type.

  • Arrays are used to store multiple values in a single variable.

  • Elements in an array are accessed by their index, starting from 0.

  • Example: String[] names = {"Alice", "Bob", "Charlie"};

Add your answer

Q164. Data structures and its uses

Ans.

Data structures are used to organize and store data efficiently in computer memory.

  • Data structures help in efficient data retrieval, insertion, and deletion operations.

  • Examples include arrays, linked lists, stacks, queues, trees, and graphs.

  • Each data structure has its own advantages and use cases based on the requirements of the application.

  • For example, arrays are used for random access to elements, while linked lists are useful for dynamic memory allocation.

Add your answer

Q165. reverse the string, even number

Ans.

Reverse the characters of each string in the array if the length of the string is even.

  • Iterate through each string in the array

  • Check if the length of the string is even

  • If even, reverse the characters of the string

Add your answer

Q166. Different between Mysql vs Nosql?

Ans.

MySQL is a relational database management system, while NoSQL is a non-relational database management system.

  • MySQL is a structured database with tables and rows, while NoSQL is unstructured and can store data in various formats like key-value pairs, documents, graphs, etc.

  • MySQL is ACID-compliant, ensuring data integrity, while NoSQL sacrifices some ACID properties for better scalability and performance.

  • MySQL is suitable for complex queries and transactions, while NoSQL is bet...read more

Add your answer

Q167. what is hub and router

Ans.

A hub is a networking device that connects multiple devices in a network, while a router is a networking device that forwards data packets between computer networks.

  • Hub operates at physical layer of OSI model

  • Hub broadcasts data to all devices in the network

  • Router operates at network layer of OSI model

  • Router forwards data packets based on IP addresses

  • Example of hub: Ethernet hub

  • Example of router: Wi-Fi router

Add your answer

Q168. What is threat modelling

Ans.

Threat modelling is a structured approach to identifying and prioritizing potential security threats to a system.

  • Involves identifying potential threats to a system

  • Prioritizing threats based on likelihood and impact

  • Helps in designing appropriate security controls

  • Common methodologies include STRIDE and DREAD

  • Example: Identifying potential threats to a web application such as SQL injection, cross-site scripting, etc.

Add your answer

Q169. Give me a program for palindrome

Ans.

A program to check if a given string is a palindrome or not

  • Create a function that takes a string as input

  • Remove all non-alphanumeric characters and convert the string to lowercase

  • Compare the original string with its reverse to check if it's a palindrome

  • Return true if it's a palindrome, false otherwise

Add your answer

Q170. Write essay on time management

Ans.

Time management is crucial for productivity and efficiency in both personal and professional life.

  • Set clear goals and prioritize tasks based on importance and deadlines

  • Use tools like calendars, to-do lists, and time tracking apps to stay organized

  • Avoid multitasking and focus on one task at a time to improve concentration and quality of work

  • Delegate tasks when possible to free up time for more important responsibilities

  • Take regular breaks to avoid burnout and maintain producti...read more

Add your answer

Q171. What is regression testing

Ans.

Regression testing is the process of retesting a software application to ensure that new code changes have not adversely affected existing functionality.

  • Performed after code changes to ensure existing functionality still works

  • Helps catch bugs introduced by new code changes

  • Automated tools can be used to streamline the process

  • Examples: running test cases after a software update, checking if bug fixes have caused new issues

Add your answer

Q172. what is xss and sqli

Ans.

XSS (Cross-Site Scripting) is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users. SQLi (SQL Injection) is a code injection technique that exploits a security vulnerability in a website's software.

  • XSS allows attackers to execute scripts in the victim's browser, potentially stealing sensitive information or defacing the website.

  • SQLi allows attackers to manipulate a website's database by injecting malicious SQL...read more

Add your answer

Q173. What is accounts

Ans.

Accounts refer to financial records that track the financial activities of an individual or organization.

  • Accounts are used to track income, expenses, assets, and liabilities.

  • Examples of accounts include checking accounts, savings accounts, and credit card accounts.

  • Accounts are essential for budgeting, financial planning, and tax purposes.

Add your answer

Q174. What is economics

Ans.

Economics is the study of how individuals, businesses, and governments allocate resources to satisfy unlimited wants.

  • Economics examines how goods and services are produced, distributed, and consumed.

  • It analyzes factors such as supply and demand, inflation, unemployment, and economic growth.

  • Economics also explores how individuals and societies make decisions about resource allocation.

  • Examples include studying the impact of government policies on the economy or analyzing consum...read more

Add your answer

Q175. What is waterfall and agile

Ans.

Waterfall and Agile are two different project management methodologies used in software development.

  • Waterfall is a linear and sequential approach where each phase must be completed before moving on to the next.

  • Agile is an iterative and flexible approach that focuses on delivering small, incremental releases and adapting to changes quickly.

  • Waterfall is more suitable for projects with well-defined requirements, while Agile is better for projects with evolving requirements.

  • Examp...read more

Add your answer

Q176. What is cd? What is lvm,

Ans.

cd stands for change directory. It is a command used in command-line interfaces to navigate between directories.

  • cd is used to change the current working directory in a command-line interface

  • It is commonly used in operating systems like Unix, Linux, and Windows

  • cd followed by a directory name or path changes the current directory to the specified one

  • cd .. moves up one level in the directory hierarchy

  • cd / takes you to the root directory

Add your answer

Q177. What is linked list?

Ans.

A linked list is a data structure where each element points to the next element in the sequence.

  • Consists of nodes where each node contains data and a reference to the next node

  • Can be singly linked (each node points to the next) or doubly linked (each node points to the next and previous)

  • Example: 1 -> 2 -> 3 -> null

Add your answer

Q178. types of join and explain

Ans.

Types of join are inner, left, right and full outer join.

  • Inner join returns only the matching rows from both tables.

  • Left join returns all the rows from the left table and matching rows from the right table.

  • Right join returns all the rows from the right table and matching rows from the left table.

  • Full outer join returns all the rows from both tables, with NULL values in the columns where there is no match.

  • Join is used to combine data from two or more tables based on a related ...read more

Add your answer

Q179. Stages in devops

Ans.

DevOps stages include plan, code, build, test, release, deploy, operate, and monitor.

  • Plan: Define goals and plan the project.

  • Code: Develop and code the software.

  • Build: Compile the code into executable files.

  • Test: Test the software for bugs and issues.

  • Release: Deploy the software for users.

  • Deploy: Implement the software in the production environment.

  • Operate: Manage and maintain the software.

  • Monitor: Monitor the software performance and user feedback.

Add your answer

Q180. Oops concept in java

Ans.

Oops concept in java

  • Object-oriented programming paradigm

  • Encapsulation, Inheritance, Polymorphism, Abstraction

  • Classes and Objects

  • Access Modifiers

  • Interfaces and Abstract Classes

Add your answer

Q181. Whats Agile

Ans.

Agile is a project management methodology that emphasizes flexibility, collaboration, and continuous improvement.

  • Agile values individuals and interactions over processes and tools

  • It emphasizes working software over comprehensive documentation

  • Agile involves frequent iterations and feedback loops

  • Scrum and Kanban are popular Agile frameworks

  • Agile is used in software development, but can be applied to other industries

Add your answer

Q182. difference between switch and router

Ans.

Switch is used to connect devices within a network, while a router is used to connect different networks together.

  • Switch operates at layer 2 of the OSI model, while router operates at layer 3.

  • Switch forwards data based on MAC addresses, while router forwards data based on IP addresses.

  • Switch is typically used in LANs, while router is used to connect LANs or WANs.

  • Switches are faster in forwarding data within a network, while routers are slower due to additional processing for ...read more

Add your answer

Q183. Description about engineering drawing

Ans.

Engineering drawing is a visual representation of an object or system, typically created using specialized software or by hand.

  • Engineering drawings communicate design intent and specifications to manufacturers and other stakeholders.

  • They include details such as dimensions, materials, tolerances, and assembly instructions.

  • Common types of engineering drawings include orthographic projections, isometric views, and exploded views.

  • Engineering drawings adhere to specific standards,...read more

Add your answer

Q184. Testing principles andexplain them

Ans.

Testing principles are guidelines that help testers in their testing activities to ensure quality software.

  • Testing should be planned and systematic

  • Testing should start early in the software development lifecycle

  • Testing should be objective and independent

  • Testing should be thorough and cover all possible scenarios

  • Testing should be based on requirements and specifications

Add your answer

Q185. 3 golden rules of accounts

Ans.

The 3 golden rules of accounts are the fundamental accounting principles that guide the recording of financial transactions.

  • 1. Debit what comes in, credit what goes out

  • 2. Debit the receiver, credit the giver

  • 3. Debit expenses and losses, credit income and gains

Add your answer

Q186. types of data in python

Ans.

Python supports various data types including numeric, string, boolean, list, tuple, set, and dictionary.

  • Numeric data types include int, float, and complex

  • String data type is represented by str

  • Boolean data type is represented by bool

  • List data type is represented by list

  • Tuple data type is represented by tuple

  • Set data type is represented by set

  • Dictionary data type is represented by dict

Add your answer

Q187. Why KYC is needed

Ans.

KYC is needed to verify the identity of customers and prevent fraud, money laundering, and terrorist financing.

  • KYC helps in verifying the identity of customers to ensure they are who they claim to be.

  • It helps in preventing fraud by ensuring that the customers are not using false identities.

  • KYC also helps in detecting and preventing money laundering and terrorist financing activities.

  • It is a regulatory requirement in many industries such as banking, financial services, and cry...read more

Add your answer

Q188. what is strenght?

Ans.

Strength is the ability to overcome challenges, persevere in difficult situations, and achieve goals.

  • Physical strength: ability to lift heavy objects, perform physical tasks

  • Mental strength: ability to stay focused, handle stress, make tough decisions

  • Emotional strength: ability to cope with emotions, maintain resilience

  • Strength of character: integrity, determination, courage

  • Strength in relationships: ability to communicate effectively, resolve conflicts

Add your answer

Q189. Explain me tags in html

Ans.

HTML tags are used to define the structure and content of a web page.

  • HTML tags are enclosed in angle brackets, like <tag>.

  • Tags are used to define elements such as headings, paragraphs, images, links, etc.

  • Tags can have attributes that provide additional information about the element, like <img src='image.jpg'>.

Add your answer

Q190. Windows function of sql?

Ans.

Windows function in SQL is used to perform calculations across a set of table rows related to the current row.

  • Windows functions are used to calculate values based on a specific window or subset of rows within a table.

  • They allow for aggregation and ranking functions to be applied to a specific set of rows.

  • Examples include ROW_NUMBER(), RANK(), DENSE_RANK(), and NTILE().

Add your answer

Q191. Whay yu have not clear?

Ans.

The question may be unclear due to lack of context or specific details.

  • Ask for clarification on what specific information or details are needed

  • Request examples or further explanation to better understand the question

  • Offer to provide additional information or examples if needed

Add your answer

Q192. What is sast dast

Ans.

SAST stands for Static Application Security Testing and DAST stands for Dynamic Application Security Testing.

  • SAST involves analyzing the application's source code for security vulnerabilities before it is compiled and deployed.

  • DAST involves testing the application while it is running to identify vulnerabilities from the outside.

  • SAST is more focused on finding potential security issues in the code itself, while DAST is more focused on identifying vulnerabilities in the running...read more

Add your answer

Q193. What are AML stages

Ans.

AML stages refer to the different phases of acute myeloid leukemia progression.

  • AML stages include remission induction, consolidation, and maintenance therapy.

  • Remission induction aims to achieve complete remission of leukemia cells.

  • Consolidation therapy is given to eliminate any remaining leukemia cells.

  • Maintenance therapy is used to prevent the return of leukemia cells.

  • Staging helps determine the appropriate treatment plan for AML patients.

Add your answer

Q194. What is sdlc and uml

Ans.

SDLC stands for Software Development Life Cycle, which is a process used by software development teams to design, develop, and test high-quality software. UML stands for Unified Modeling Language, which is a standardized modeling language used to visually represent software systems.

  • SDLC is a framework that defines the tasks performed at each phase of software development, including planning, analysis, design, implementation, testing, and maintenance.

  • UML is a visual language u...read more

Add your answer

Q195. Explain technical skills

Ans.

Technical skills refer to the abilities and knowledge needed to perform specific tasks in a professional field.

  • Technical skills are practical abilities that are gained through training, education, and experience.

  • They are specific to a particular job or industry and are often related to using tools, software, or equipment.

  • Examples of technical skills include programming languages, data analysis, graphic design, and project management.

  • Technical skills are essential for consulta...read more

Add your answer

Q196. what is java and sql

Ans.

Java is a popular programming language used for developing applications, while SQL is a language used for managing and querying databases.

  • Java is an object-oriented programming language known for its portability and versatility.

  • SQL stands for Structured Query Language and is used to communicate with databases.

  • Java is used for developing web applications, mobile apps, and enterprise software.

  • SQL is used for creating, updating, and querying data in databases.

  • Examples: Java - wr...read more

Add your answer

Q197. Write program on given topic

Ans.

Write a program to calculate the factorial of a given number.

  • Create a function to calculate the factorial recursively or iteratively.

  • Handle edge cases like negative numbers or zero.

  • Use a loop to multiply numbers from 1 to the given number to calculate the factorial.

Add your answer

Q198. Plsql Function procedure

Ans.

A PL/SQL function is a named PL/SQL block that returns a value.

  • Functions are used to perform a specific task and return a single value.

  • They can accept input parameters and return a value.

  • Functions can be called from SQL statements or other PL/SQL blocks.

Add your answer

Q199. Trouble shooting of os

Ans.

Troubleshooting of operating systems involves identifying and resolving issues that may arise during system operation.

  • Identify the specific issue or error message

  • Check for recent changes or updates that may have caused the issue

  • Verify hardware and software compatibility

  • Use diagnostic tools to pinpoint the problem

  • Attempt to resolve the issue through system settings or updates

Add your answer

Q200. Define ur birthday eve

Ans.

Birthday eve is the day before one's birthday, often celebrated with anticipation and excitement.

  • It is a time for reflection on the past year and anticipation for the year ahead

  • Some people have birthday eve traditions such as a special dinner or gathering with loved ones

  • Gifts or surprises may be exchanged on birthday eve as well

Add your answer
1
2
3
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Salesforce

based on 344 interviews
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.5
 • 2.2k Interview Questions
3.5
 • 427 Interview Questions
4.2
 • 322 Interview Questions
4.0
 • 255 Interview Questions
4.4
 • 218 Interview Questions
3.8
 • 167 Interview Questions
View all
Top TCS iON Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter