Tech Mahindra
90+ Interview Questions and Answers
Q1. How to apply SOLID principle and what is dependency injection and why to use it and scenarios on where to use
SOLID principles ensure maintainable and scalable code. Dependency Injection helps in achieving loose coupling and testability.
SOLID principles are Single Responsibility, Open-Closed, Liskov Substitution, Interface Segregation, and Dependency Inversion
Dependency Injection is a design pattern that allows objects to be loosely coupled and easily testable
Use Dependency Injection to reduce tight coupling between classes and make them more modular
Use SOLID principles to ensure mai...read more
Q2. In azure data factory how would you implement the functionality of tumbling window without actually using that feature already available?
Implementing tumbling window in Azure Data Factory without using the feature
Create a pipeline with a trigger that runs at the desired interval
Use a lookup activity to retrieve the data for the current window
Use a foreach activity to iterate over the retrieved data
Perform the required operations on the data within the foreach activity
Write the output to the desired destination
Q3. 1)Val a = Array(1,2,1,3,4) Need output as (1,2) (2,1) (1,3) (3,4)
Print pairs of adjacent elements in an array
Loop through the array and print each pair of adjacent elements
Use a for loop and access the elements using their indices
Example: for i in 0 until a.length-1 print (a[i], a[i+1])
Q4. What is the biggest challenge you faced in developing azure solution?
The biggest challenge in developing Azure solution was managing the complexity of the cloud environment.
Managing the complexity of the cloud environment
Ensuring scalability and reliability
Integrating with existing systems
Securing the solution
Optimizing cost
Example: Migrating a legacy application to Azure
Q5. What would be your suggestion for implementation in azure data factory v2?
My suggestion for implementation in Azure Data Factory v2 is to use the Mapping Data Flow feature.
Utilize Mapping Data Flow for complex data transformations
Take advantage of the visual interface to design and debug data flows
Leverage the built-in data integration capabilities with other Azure services
Use data flow parameters and expressions for dynamic transformations
Monitor and optimize data flow performance using data flow debug and profiling
Q6. How do you deal with customers through email, Do you have any experience handling this?
Yes
I have extensive experience dealing with customers through email
I prioritize clear and concise communication to address customer inquiries and concerns
I ensure prompt responses and follow-ups to maintain customer satisfaction
I have successfully resolved complex issues and provided technical guidance via email
I maintain a professional and empathetic tone in all customer interactions
Q7. How many projects or process you implemented in RE framework?
I have implemented RE framework in 3 projects.
Implemented RE framework in 3 projects
Used RE framework for automating end-to-end processes
Leveraged RE framework's modular structure for easy maintenance
Examples: Invoice processing, Order management, HR onboarding
Q8. How to configure hibernate with spring framework?
Hibernate can be configured with Spring using LocalSessionFactoryBean and HibernateTransactionManager.
Add hibernate and spring dependencies in pom.xml
Configure datasource in application.properties
Create LocalSessionFactoryBean bean in Spring configuration
Configure hibernate properties in LocalSessionFactoryBean
Create HibernateTransactionManager bean in Spring configuration
Use @Transactional annotation for database transactions
Q9. Which ORM is better and why
There is no one-size-fits-all answer to this question as it depends on the specific project requirements.
ORMs like Hibernate are popular for Java projects
Django ORM is widely used for Python projects
Entity Framework is commonly used for .NET projects
Consider factors like performance, ease of use, and community support when choosing an ORM
Ultimately, the best ORM is the one that fits the project's specific needs
Q10. Difference between MVVM vs MVC. What is Live data?
MVVM is a design pattern that separates UI from business logic. Live data is observable data that updates UI automatically.
MVC separates UI, business logic, and data. MVVM adds a ViewModel layer to handle UI logic.
Live data is a type of observable data that updates UI automatically when the data changes.
MVVM and Live data are commonly used in Android development with the Android Architecture Components.
MVC is commonly used in web development with frameworks like Ruby on Rails...read more
Q11. What do you do incase of bot execution failure
In case of bot execution failure, I would identify the root cause and fix it as soon as possible.
Check the logs to identify the error message and the point of failure
Analyze the code to identify the root cause of the failure
Fix the issue and test the bot again to ensure it is working as expected
Implement measures to prevent similar failures in the future
Q12. What is the difference between Map and flatMap
Map transforms each element of a collection, while flatMap transforms each element into a new collection.
Map applies a function to each element of a collection and returns a new collection with the transformed elements.
FlatMap applies a function to each element of a collection and returns a new collection by concatenating the resulting collections.
Map returns a collection with the same number of elements as the original collection, while flatMap can return a collection with a...read more
Q13. what are the steps you will take while updating a build and how you will do rollback
Steps for updating a build and performing rollback
Create a backup of the current build before making any changes
Update the build with the necessary changes and test thoroughly
If issues are found, identify the cause and plan for rollback
Rollback by restoring the backup of the previous build
Communicate the rollback to the team and document the process
Q14. Concept Of service. Type of service. Difference Between Job scheduler and work Manager.
Service is a software component that performs a specific task. Job scheduler and work manager are types of services used in software development.
A service is a self-contained component that performs a specific task.
Types of services include web services, microservices, and background services.
Job scheduler is a service that schedules and executes jobs at specific times or intervals.
Work manager is a service that manages and prioritizes work requests.
Job scheduler is time-base...read more
Q15. What kind of applications does AI have and how can you use them on the job?
AI applications include natural language processing, image recognition, recommendation systems, and autonomous vehicles.
Natural language processing for chatbots and virtual assistants
Image recognition for facial recognition and object detection
Recommendation systems for personalized content suggestions
Autonomous vehicles for self-driving cars
Q16. What is multi Threading. Oops concept.
Multithreading is the ability of a CPU to execute multiple threads concurrently.
Multithreading allows for parallel processing and can improve performance.
In object-oriented programming, multithreading can be implemented using the Thread class.
Examples of multithreaded applications include web servers and video games.
Q17. Difference between arraylist and linked list?
ArrayList is a resizable array implementation while LinkedList is a doubly linked list implementation.
ArrayList is faster for accessing elements while LinkedList is faster for adding or removing elements.
ArrayList uses contiguous memory while LinkedList uses non-contiguous memory.
ArrayList is better for random access while LinkedList is better for sequential access.
Example: ArrayList - List
names = new ArrayList<>(); LinkedList - List names = new LinkedList<>();
Q18. Use interface name before method name while implementing the method in class. Ex- interfacename.methodname()
Using interface name before method name while implementing the method in class.
This is a recommended practice in Java programming.
It helps in avoiding naming conflicts and improves code readability.
Example: MyInterface.myMethod();
Q19. How to deploy ivr application in servers.
IVR application can be deployed in servers using various deployment methods.
Choose a deployment method based on the application requirements and server environment.
Common deployment methods include manual deployment, automated deployment, and containerization.
Ensure that all necessary dependencies and configurations are included in the deployment package.
Test the application thoroughly after deployment to ensure it is functioning correctly.
Q20. How to implicitly call an interface method?
To implicitly call an interface method, create an object of the implementing class and assign it to the interface type.
Create an interface with the desired method signature
Create a class that implements the interface
Create an object of the implementing class and assign it to the interface type
Call the method on the interface object
The implementing class's method will be implicitly called
Q21. What is Can FD and why it is required.
CAN FD stands for Controller Area Network Flexible Data Rate, it is required for high-speed communication in automotive and industrial applications.
CAN FD allows for higher data rates compared to traditional CAN networks
It is necessary for transmitting large amounts of data quickly and efficiently
Used in applications where real-time communication and reliability are crucial, such as automotive ECUs
Example: CAN FD is used in modern cars for transmitting sensor data, control si...read more
Q22. what are access ties available in azure storage
Access tiers in Azure Storage include hot, cool, and archive tiers.
Hot access tier: Optimized for frequently accessed data with higher storage costs.
Cool access tier: Optimized for infrequently accessed data with lower storage costs.
Archive access tier: Optimized for rarely accessed data with the lowest storage costs.
Data in the archive tier may have longer retrieval times compared to hot and cool tiers.
Q23. how will you handle errors in prod environment
I will handle errors in prod environment by implementing proper error logging, monitoring, and alerting systems.
Implement comprehensive error logging to track errors and their root causes
Set up monitoring tools to detect errors in real-time and alert the team
Establish a process for prioritizing and resolving errors based on impact and severity
Regularly review and analyze error logs to identify patterns and prevent future occurrences
Q24. What is patch and how to create and apply
A patch is a file that contains changes to a software program. It can be created using a diff tool and applied using a patch tool.
A patch file contains the changes made to a software program.
It can be created using a diff tool like Git diff or SVN diff.
The patch file can be applied using a patch tool like Git apply or SVN patch.
Patches are commonly used to update software programs or fix bugs.
Patches can also be used to customize software programs by adding or removing featur...read more
Q25. Write a program in java to count the occurrence of each character in a string
Program in Java to count occurrence of each character in a string
Create a HashMap to store characters and their counts
Iterate through the string and update the counts in the HashMap
Print the characters and their counts from the HashMap
Q26. Types of annotations in spring boot?
Spring Boot has several annotations for different purposes.
Spring Boot annotations are used for configuration, mapping, security, testing, etc.
@Configuration, @RestController, @RequestMapping, @Autowired, @Test are some commonly used annotations.
Annotations help in reducing boilerplate code and make the code more readable and maintainable.
Q27. Under which principle does VLAN work?
VLAN works under the principle of network segmentation.
VLAN separates a physical network into multiple logical networks.
It improves network performance, security, and management.
VLAN tags packets with a unique identifier to identify the network they belong to.
Example: VLAN can be used to separate guest and employee networks in a company.
Q28. What is the purpose of static keyword in Java
Static keyword in Java is used to create class-level variables and methods that can be accessed without creating an instance of the class.
Static variables are shared among all instances of a class
Static methods can be called without creating an object of the class
Static keyword can be used to create static blocks for initializing static variables
Static keyword can also be used to create static nested classes
Q29. Write testcases for Whatsapp video calling feature
Testcases for Whatsapp video calling feature
Test if video call can be initiated successfully
Test if video call can be accepted/rejected by recipient
Test if video call quality is good
Test if video call can be ended properly
Test if video call can be switched to voice call
Test if video call works on different network connections (3G, 4G, Wi-Fi)
Test if video call works on different devices (Android, iOS)
Test if video call can be made in a group chat
Q30. How does hash map internally work in Java?
HashMap in Java uses an array of linked lists to store key-value pairs, with keys being hashed to determine the index in the array.
HashMap contains an array of linked lists where each element is a key-value pair
When a key is inserted, its hash code is used to determine the index in the array
If multiple keys hash to the same index, they are stored in a linked list at that index
To retrieve a value, the key's hash code is used to find the correct index and then search the linked...read more
Q31. What is current CTC and expected CTC
The question asks about the candidate's current and expected salary.
Be honest and transparent about your current salary.
Research the market rates for your role and level of experience to determine a reasonable expected salary.
Consider other benefits and perks besides the base salary.
Avoid discussing salary expectations too early in the interview process.
Focus on the value you can bring to the company rather than just the salary.
Q32. What are the services in Drupal?
Drupal provides various services to extend its functionality and features.
Drupal core services such as database, cache, and logging
Third-party services like RESTful web services, search, and email
Custom services created by developers to meet specific needs
Services can be accessed through Drupal's Service Container
Q33. Different design patterns
Design patterns are reusable solutions to common software problems.
Creational patterns: Singleton, Factory, Abstract Factory
Structural patterns: Adapter, Decorator, Facade
Behavioral patterns: Observer, Strategy, Command
Architectural patterns: Model-View-Controller, Model-View-ViewModel
Concurrency patterns: Thread Pool, Producer-Consumer, Future
Q34. Write a code for displaying list of employees using stream api
Display list of employees using stream api
Use Stream API to iterate through the list of employees
Use forEach() method to display each employee's information
Example: employees.stream().forEach(employee -> System.out.println(employee));
Q35. Explain the differences between regression testing and retesting
Regression testing is testing the entire application after changes, while retesting is testing a specific bug fix.
Regression testing involves testing the entire application to ensure that new code changes have not negatively impacted existing functionality.
Retesting involves testing a specific bug fix to ensure that the issue has been resolved.
Regression testing is typically done after every code change, while retesting is done after a bug fix.
Regression testing helps ensure ...read more
Q36. coding for list comparator in object class for employee based on salary and name
Implement list comparator in object class for employees based on salary and name
Override the compareTo method in the Employee class to compare based on salary and name
Use Comparator interface to implement custom sorting logic
Example: Employee class with fields salary and name, compareTo method comparing first by salary then by name
Q37. How to create custom module in drupal
To create a custom module in Drupal, follow these steps:
Create a new folder in the 'modules' directory of your Drupal installation
Create a .info.yml file in the new folder with module information
Create a .module file in the new folder with module code
Enable the module in the Drupal admin interface
Clear the cache to ensure Drupal recognizes the new module
Q38. Advantages of reactjs, hooks, html, css, version of react and difference
Advantages of ReactJS, hooks, HTML, CSS, version of React and their differences.
ReactJS is a popular JavaScript library for building user interfaces.
Hooks allow for stateful logic in functional components.
HTML and CSS are used for structuring and styling web pages.
React version 16 introduced features like error boundaries and portals.
React version 17 focused on improving the upgrade process.
ReactJS is faster than other frameworks due to its virtual DOM.
ReactJS has a large and...read more
Q39. What are the Trigger in Salesforce?
Triggers are automated actions that execute when certain events occur in Salesforce.
Triggers are used to perform custom actions before or after specific events occur in Salesforce.
They can be used to update related records, send email notifications, or perform other custom logic.
Triggers can be written in Apex code and are associated with a specific object in Salesforce.
Examples of trigger events include record creation, deletion, or update.
Triggers can also be used to enforc...read more
Q40. SAP master data and process of plant mintenace
The SAP master data is used to maintain plant maintenance processes.
SAP master data is used to store information about equipment, functional locations, and maintenance plans.
Plant maintenance processes involve creating and scheduling maintenance orders, performing inspections, and recording maintenance history.
The SAP system can generate notifications for maintenance tasks based on predefined criteria.
Maintenance data can be analyzed to identify trends and improve maintenance...read more
Q41. Writing the Test case for ADAS ECU.
Writing test cases for ADAS ECU involves verifying functionality and performance of the electronic control unit.
Identify the input and output requirements of the ADAS ECU
Create test cases to cover different scenarios such as normal operation, edge cases, and failure modes
Include test cases for communication protocols, sensor inputs, and system responses
Verify the integration of ADAS ECU with other components in the system
Perform regression testing to ensure new changes do not...read more
Q42. Find average of integer arrays using java 8 streams
Calculate average of integer arrays using Java 8 streams
Use IntStream to convert the array to a stream of integers
Use average() method to calculate the average of the integers
Collect the result using getAsDouble() method
Q43. Document verification process explanation
Document verification process involves verifying the authenticity and accuracy of documents submitted by individuals.
Verify the identity of the individual by checking their photo ID
Check the validity of the document by looking for security features such as watermarks or holograms
Cross-reference the information on the document with other sources to ensure consistency
Use automated tools like OCR (Optical Character Recognition) to extract and verify text from documents
Q44. Write program to read and write from excel
Program to read and write data from Excel using a library like Apache POI or Openpyxl.
Use a library like Apache POI for Java or Openpyxl for Python to interact with Excel files.
Read data from Excel file using library functions and write data back to Excel file after processing.
Handle exceptions like file not found or incorrect format when reading or writing to Excel.
Q45. What is MES?
MES stands for Manufacturing Execution System, a software system used to manage and monitor production processes.
MES helps to track and optimize production processes in real-time.
It collects data from various sources such as machines, sensors, and operators.
MES provides visibility into the production process, enabling better decision-making and improved efficiency.
Examples of MES software include Siemens Opcenter, SAP Manufacturing Execution, and Rockwell Automation FactoryTa...read more
Q46. How to use control break statement?
Control break statement is used to break out of a loop based on a certain condition.
Control break statement is typically used in loops to exit the loop prematurely based on a specific condition.
It helps in improving the efficiency of the code by avoiding unnecessary iterations.
Example: Using 'break' statement in a loop to exit when a certain value is reached.
Q47. Explain the CI/CD pipeline you have worked on?
Implemented a CI/CD pipeline using Jenkins, Docker, and Kubernetes for automated testing and deployment.
Utilized Jenkins for continuous integration to automatically build and test code changes
Used Docker for containerization of applications to ensure consistency across environments
Deployed applications using Kubernetes for efficient scaling and management
Integrated automated testing tools like Selenium or JUnit for quality assurance
Implemented version control with Git to trac...read more
Q48. Difference bewtween LKA and LDW.
LKA stands for Lane Keep Assist, while LDW stands for Lane Departure Warning.
LKA helps keep the vehicle centered in its lane by providing steering input if necessary.
LDW alerts the driver if the vehicle is unintentionally drifting out of its lane.
LKA is more proactive in assisting the driver with lane keeping, while LDW is more of a warning system.
Some vehicles may have both LKA and LDW features integrated for enhanced safety.
Q49. Aspice model and itr requirement.
ASPICE (Automotive SPICE) model is a framework for software development in the automotive industry. ITR (Integrated Test Requirement) is a part of ASPICE focusing on testing requirements.
ASPICE is a framework for software development in the automotive industry
ITR is a part of ASPICE that focuses on testing requirements
ASPICE helps in ensuring high-quality software development in automotive projects
Q50. Unix command procedure and functional and queries
Explaining Unix command procedure and functional queries
Unix commands are used to perform various tasks on the Unix operating system
Commands can be executed in the terminal or through shell scripts
Functional queries involve retrieving specific information from a database
Queries can be written in SQL or other query languages
Unix commands can be used to manipulate and analyze data in databases
Q51. Use Project Design Pattern.
Project Design Pattern is a reusable solution to a commonly occurring problem within a given context.
Design patterns help in creating flexible, reusable, and maintainable code.
Some commonly used design patterns are Singleton, Factory, Observer, and Decorator.
Design patterns can be categorized into three types: Creational, Structural, and Behavioral.
Choosing the right design pattern depends on the problem at hand and the context in which it is being used.
Q52. Conversion operation in string
Conversion operation in string
String conversion can be done using built-in functions like parseInt(), parseFloat(), toString(), etc.
Conversion can also be done using regular expressions and string manipulation techniques.
It is important to handle errors and edge cases while performing string conversion.
Q53. What are closures in javascriot
Closures are functions that have access to variables in their outer scope, even after the outer function has returned.
Closures are created when a function is defined inside another function.
The inner function has access to the outer function's variables and parameters.
Closures can be used to create private variables and methods.
Closures can also be used to create functions with pre-set arguments.
Q54. Joins Difference between delete and truncate
Delete removes rows one by one, while truncate removes all rows at once.
Delete is a DML command, while truncate is a DDL command.
Delete can be rolled back, while truncate cannot be rolled back.
Delete fires triggers, while truncate does not fire triggers.
Q55. How error handling in ansible
Error handling in Ansible involves using various modules and strategies to manage and respond to errors during playbook execution.
Use the 'failed_when' directive in tasks to specify conditions that should result in a task failure.
Utilize the 'ignore_errors' directive to continue executing tasks even if errors occur.
Implement error handling with 'rescue' and 'always' blocks in playbooks to handle errors and cleanup tasks.
Use the 'failed_when' and 'changed_when' directives to c...read more
Q56. what is fai-fast and fai-safe
FAI-Fast and FAI-Safe are two different approaches to Fault-Avoidance and Isolation in computer systems.
FAI-Fast is a quick and simple approach to fault-avoidance that involves shutting down the system as soon as a fault is detected.
FAI-Safe is a more complex approach that involves isolating the fault and allowing the system to continue running in a degraded state.
FAI-Safe is often used in safety-critical systems, such as medical devices or aircraft control systems.
FAI-Fast i...read more
Q57. Basic data flow in MES
MES data flow involves capturing, processing and analyzing data from manufacturing operations.
MES collects data from various sources such as machines, sensors, and operators
The data is then processed and analyzed to provide insights into the manufacturing process
MES also facilitates communication between different systems and departments
Examples of MES include Wonderware MES, SAP MES, and Rockwell MES
Q58. Live coding round. Largest common prefix
Find the largest common prefix among an array of strings
Iterate through the characters of the first string and compare with the corresponding characters of other strings
Stop when a mismatch is found or when reaching the end of any string
Return the prefix found so far
Q59. Pop and push operation in perl
Pop and push operations are used to add or remove elements from an array in Perl.
The push operation adds one or more elements to the end of an array.
Example: push(@array, 'element1', 'element2');
The pop operation removes and returns the last element of an array.
Example: my $last_element = pop(@array);
Q60. how to add system service
To add a system service, you need to create a service unit file and enable it using systemctl.
Create a service unit file in /etc/systemd/system directory with the necessary configuration
Reload systemd manager configuration using systemctl daemon-reload
Enable the service using systemctl enable
Start the service using systemctl start
Check the status of the service using systemctl status
Q61. how to create system app
To create a system app, you need to design the app architecture, implement the functionality, and test it thoroughly.
Define the requirements and goals of the system app.
Design the architecture of the app, including the user interface and backend functionality.
Implement the app using programming languages and frameworks suitable for the project.
Test the app thoroughly to ensure it functions correctly and meets the requirements.
Deploy the app to the desired platform for users t...read more
Q62. Explain about Automation Framework
Automation framework is a set of guidelines, best practices, tools, and libraries used to automate testing of software applications.
Provides structure and guidelines for automated testing
Helps in organizing test scripts and test data
Supports reusability of code and components
Facilitates easy maintenance and scalability
Examples: Selenium WebDriver, TestNG, Cucumber
Q63. What is performance tuning
Performance tuning is the process of optimizing software to improve its speed, efficiency, and resource utilization.
Identifying bottlenecks and areas of inefficiency
Optimizing algorithms and data structures
Reducing I/O operations and network latency
Caching frequently accessed data
Profiling and benchmarking to measure improvements
Tuning hardware and infrastructure
Testing and validating changes before deployment
Q64. caliberation order and use
Calibration order and use in software engineering
Calibration order refers to the sequence in which instruments are calibrated
Calibration is the process of adjusting an instrument to ensure accurate measurements
Calibration order is important to ensure that all instruments are calibrated correctly
Calibration is used to maintain the accuracy of instruments over time
Calibration is important in industries such as aerospace, automotive, and medical
Q65. why pod is ephemeral
Pod is ephemeral due to its temporary nature and dynamic lifecycle.
Pods are designed to be easily created, destroyed, and replaced.
Pods do not have persistent storage by default.
Pods are scheduled and managed by the Kubernetes control plane.
Pods can be automatically rescheduled to different nodes in case of failures.
Q66. Indexing in sql
Indexing in SQL improves query performance by creating a data structure that allows for faster data retrieval.
Indexing involves creating a separate data structure that contains the indexed columns and their corresponding row locations.
Indexes can be created on one or multiple columns.
Indexes can be clustered or non-clustered.
Clustered indexes determine the physical order of data in a table, while non-clustered indexes do not.
Indexes can be created using the CREATE INDEX state...read more
Q67. Which stream you are working
I am currently working in the software development stream.
Working in software development stream
Experience in coding and programming
Familiar with various programming languages
Q68. What is your expected CTC
My expected CTC is based on my experience, skills, and the market rate for Senior Software Engineers.
My expected CTC is in line with industry standards for Senior Software Engineers.
I have taken into consideration my years of experience and expertise in software development.
I am open to negotiation based on the overall compensation package offered by the company.
Q69. File operation and syntax
File operation and syntax
File operations include opening, reading, writing, and closing files
Syntax for opening a file: file = open('filename', mode)
Syntax for reading a file: file.read()
Syntax for writing to a file: file.write('content')
Syntax for closing a file: file.close()
Q70. Database module used in perl
DBI is the most commonly used database module in Perl.
DBI is a database-independent interface for Perl
It provides a consistent API for accessing different databases
DBD modules provide drivers for specific databases, such as DBD::mysql for MySQL
DBI supports transactions, prepared statements, and more
Q71. Internal functioning of Hash map
Hash map is a data structure that stores key-value pairs and uses a hash function to map keys to their corresponding values.
Hash map uses a hash function to determine the index of the key-value pair in the underlying array.
Collisions can occur when two keys hash to the same index, which can be resolved using techniques like chaining or open addressing.
Hash maps have constant time complexity O(1) for insertion, deletion, and lookup operations on average, but can degrade to O(n...read more
Q72. 2. N-Queen problem back tracking
The N-Queen problem is to place N chess queens on an NxN board so that no two queens threaten each other.
Backtracking is a common algorithmic technique used to solve the N-Queen problem.
The algorithm tries to place a queen in each row of the board, and backtracks if it cannot find a valid position.
The solution can be optimized by using bit manipulation to check for conflicts between queens.
The time complexity of the algorithm is O(N!), which can be improved using heuristics o...read more
Q73. Bootstrap react app without CRA
Bootstraping a React app without Create React App (CRA)
Set up webpack configuration for bundling
Install necessary dependencies like react, react-dom, babel, etc.
Configure Babel for transpiling JSX and ES6 syntax
Set up a development server for hot reloading
Create a basic folder structure for components, styles, etc.
Q74. 1. Describle design patterns.
Design patterns are reusable solutions to common software design problems.
Design patterns provide a common language for developers to communicate about solutions to common problems.
They can improve the quality, maintainability, and scalability of software.
Examples include the Singleton pattern, Factory pattern, and Observer pattern.
Q75. Partitioning and clustering difference
Partitioning divides data into smaller chunks for easier management, while clustering groups similar data together for efficient retrieval.
Partitioning is dividing data into smaller subsets for easier management and scalability.
Clustering is grouping similar data together to improve query performance.
Partitioning is often used in databases to distribute data across multiple servers.
Clustering is used in data mining to identify patterns and relationships among data points.
Q76. View and materialised view difference
Difference between view and materialized view
A view is a virtual table that does not store data, while a materialized view is a physical table that stores data
Views are dynamically generated while materialized views are precomputed and stored
Materialized views are faster for read-heavy workloads but slower for write-heavy workloads
Materialized views need to be refreshed periodically to ensure data consistency
Q77. Explain about polymorphism
Polymorphism is the ability of a single function or method to operate on different types of data.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
There are two types of polymorphism: compile-time (method overloading) and runtime (method overriding).
Example of compile-time polymorphism: function overloading in C++.
Example of runtime polymorphism: method overriding in Java.
Q78. Explain about Pega testing
Pega testing is a software testing process specifically designed for applications built on the Pega platform.
Pega testing involves testing the functionality, performance, and security of applications developed using Pega technology.
It includes testing various components such as user interfaces, business logic, integrations, and workflows.
Test cases are designed to validate the behavior of Pega applications based on business requirements.
Common testing tools used for Pega test...read more
Q79. Advantage of Accumulator
Accumulator is a register that stores intermediate results of arithmetic and logic operations.
Accumulator reduces the number of memory accesses required for arithmetic operations.
It speeds up the execution of arithmetic and logic operations.
It is used in many microprocessors and microcontrollers.
For example, in the Intel 8085 microprocessor, the accumulator is an 8-bit register used for arithmetic and logic operations.
Q80. What is Hot fix
A hot fix is a software patch designed to fix a specific issue or bug in a program without disrupting the overall functionality.
Hot fixes are typically small updates that address critical issues or vulnerabilities.
They are often released quickly to address urgent problems without waiting for a full software update.
Hot fixes are usually temporary solutions until a more permanent fix can be implemented.
Examples of hot fixes include security patches for software vulnerabilities ...read more
Q81. What is C++
C++ is a high-level programming language used for developing system software, application software, device drivers, and video games.
C++ is an extension of the C programming language.
It supports object-oriented programming concepts like classes, inheritance, polymorphism, and encapsulation.
C++ is used in developing operating systems, browsers, databases, and other software applications.
It is known for its performance and efficiency in memory management.
Examples of popular soft...read more
Q82. What is Link List
A data structure that stores a sequence of elements in a linear order.
Consists of nodes that contain data and a pointer to the next node.
Can be singly linked or doubly linked.
Used for implementing stacks, queues, and hash tables.
Example: Singly linked list - 1 -> 2 -> 3 -> null
Example: Doubly linked list - null <- 1 <-> 2 <-> 3 -> null
Q83. First line of perl
The first line of Perl typically starts with a shebang and specifies the path to the Perl interpreter.
The shebang line is used to tell the system which interpreter to use to run the script
The shebang line starts with #! followed by the path to the Perl interpreter
Example: #!/usr/bin/perl
Q84. Temporary stored procedures?
Temporary stored procedures are stored in tempdb and are only available during the session in which they were created.
Temporary stored procedures are created using the CREATE PROCEDURE statement with the # prefix for the procedure name.
They are only available to the session in which they were created and are automatically dropped when the session ends.
They can be useful for performing complex data manipulation within a single session without cluttering up the master database ...read more
Q85. what is idempotency
Idempotency is the property of an operation where applying it multiple times has the same effect as applying it once.
Idempotency ensures that repeating the same operation multiple times will not change the result.
Examples include GET requests in RESTful APIs, where multiple identical requests will return the same response.
Idempotency is important in distributed systems to prevent duplicate operations.
PUT and DELETE requests in RESTful APIs should be idempotent.
Q86. explain boot sequence
Boot sequence is the process of starting up a computer system.
Power on the computer
BIOS/UEFI initialization
Load bootloader
Load operating system kernel
Initialize hardware and peripherals
Launch user interface
Q87. what is clouser
A closure is a function that has access to its own scope, as well as the outer scope in which it was defined.
A closure allows a function to access variables from its outer function even after the outer function has finished executing.
Closures are commonly used in JavaScript for data encapsulation and creating private variables.
Example: const outerFunction = () => { const outerVar = 'I am outer'; return () => { console.log(outerVar); }; }; const innerFunction = outerFunction()...read more
Q88. What is virsual dom
Virtual DOM is a lightweight copy of the actual DOM in memory, used for efficient updates in web development.
Virtual DOM is a concept used in frameworks like React to improve performance by minimizing actual DOM manipulations.
Changes are first made to the virtual DOM, then compared with the actual DOM to only update what has changed.
This process helps reduce re-rendering of the entire page, leading to faster and more efficient web applications.
Q89. Explain project
Developed a web-based project management tool for tracking tasks and deadlines
Created user-friendly interface for adding, editing, and deleting tasks
Implemented notifications for upcoming deadlines
Integrated with calendar API for scheduling tasks
Q90. Csrf token in CodeIgniter
CSRF token in CodeIgniter is a security feature to prevent cross-site request forgery attacks.
CSRF protection is enabled by default in CodeIgniter.
To generate a CSRF token, use the form_open() function in views.
To validate the CSRF token, use the form_validation library in controllers.
Q91. Reverse a string
Reverse a string by iterating through the characters and swapping them
Create a function that takes a string as input
Initialize two pointers, one at the beginning and one at the end of the string
Swap the characters at the two pointers and move them towards the center until they meet
Q92. Xxe tage explain
XXE stands for XML External Entity and is a type of attack that exploits vulnerabilities in XML parsers.
XXE attacks involve injecting malicious XML entities into an XML document to exploit vulnerabilities in the parser.
These attacks can lead to sensitive data disclosure, server-side request forgery, and remote code execution.
Preventing XXE attacks involves validating and sanitizing input, disabling external entity processing, and using secure XML parsers.
Q93. Soap vs RESTFUL API
SOAP is a protocol, RESTful is an architectural style for APIs.
SOAP is a protocol with strict standards for communication
RESTful APIs are more flexible and use standard HTTP methods
SOAP is XML-based, RESTful APIs can use various formats like JSON
SOAP has built-in security features, RESTful APIs rely on external mechanisms
SOAP is more suitable for complex operations, RESTful APIs are simpler and more lightweight
Q94. define microservices
Microservices are a software development technique where applications are composed of small, independent services that communicate over well-defined APIs.
Microservices break down applications into smaller, loosely coupled services
Each service is responsible for a specific function and can be developed, deployed, and scaled independently
Communication between services is typically done through APIs, often using lightweight protocols like HTTP or messaging queues
Microservices al...read more
Top HR Questions asked in null
Interview Process at null
Top Senior Software Engineer Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month