Add office photos
Engaged Employer

Tech Mahindra

3.6
based on 33k Reviews
Filter interviews by

90+ Interview Questions and Answers

Updated 20 Nov 2024
Popular Designations

Q1. How to apply SOLID principle and what is dependency injection and why to use it and scenarios on where to use

Ans.

SOLID principles ensure maintainable and scalable code. Dependency Injection helps in achieving loose coupling and testability.

  • SOLID principles are Single Responsibility, Open-Closed, Liskov Substitution, Interface Segregation, and Dependency Inversion

  • Dependency Injection is a design pattern that allows objects to be loosely coupled and easily testable

  • Use Dependency Injection to reduce tight coupling between classes and make them more modular

  • Use SOLID principles to ensure mai...read more

View 3 more answers

Q2. In azure data factory how would you implement the functionality of tumbling window without actually using that feature already available?

Ans.

Implementing tumbling window in Azure Data Factory without using the feature

  • Create a pipeline with a trigger that runs at the desired interval

  • Use a lookup activity to retrieve the data for the current window

  • Use a foreach activity to iterate over the retrieved data

  • Perform the required operations on the data within the foreach activity

  • Write the output to the desired destination

View 1 answer

Q3. 1)Val a = Array(1,2,1,3,4) Need output as (1,2) (2,1) (1,3) (3,4)

Ans.

Print pairs of adjacent elements in an array

  • Loop through the array and print each pair of adjacent elements

  • Use a for loop and access the elements using their indices

  • Example: for i in 0 until a.length-1 print (a[i], a[i+1])

View 5 more answers

Q4. What is the biggest challenge you faced in developing azure solution?

Ans.

The biggest challenge in developing Azure solution was managing the complexity of the cloud environment.

  • Managing the complexity of the cloud environment

  • Ensuring scalability and reliability

  • Integrating with existing systems

  • Securing the solution

  • Optimizing cost

  • Example: Migrating a legacy application to Azure

Add your answer
Discover null interview dos and don'ts from real experiences

Q5. What would be your suggestion for implementation in azure data factory v2?

Ans.

My suggestion for implementation in Azure Data Factory v2 is to use the Mapping Data Flow feature.

  • Utilize Mapping Data Flow for complex data transformations

  • Take advantage of the visual interface to design and debug data flows

  • Leverage the built-in data integration capabilities with other Azure services

  • Use data flow parameters and expressions for dynamic transformations

  • Monitor and optimize data flow performance using data flow debug and profiling

Add your answer

Q6. How do you deal with customers through email, Do you have any experience handling this?

Ans.

Yes

  • I have extensive experience dealing with customers through email

  • I prioritize clear and concise communication to address customer inquiries and concerns

  • I ensure prompt responses and follow-ups to maintain customer satisfaction

  • I have successfully resolved complex issues and provided technical guidance via email

  • I maintain a professional and empathetic tone in all customer interactions

Add your answer
Are these interview questions helpful?

Q7. How many projects or process you implemented in RE framework?

Ans.

I have implemented RE framework in 3 projects.

  • Implemented RE framework in 3 projects

  • Used RE framework for automating end-to-end processes

  • Leveraged RE framework's modular structure for easy maintenance

  • Examples: Invoice processing, Order management, HR onboarding

Add your answer

Q8. How to configure hibernate with spring framework?

Ans.

Hibernate can be configured with Spring using LocalSessionFactoryBean and HibernateTransactionManager.

  • Add hibernate and spring dependencies in pom.xml

  • Configure datasource in application.properties

  • Create LocalSessionFactoryBean bean in Spring configuration

  • Configure hibernate properties in LocalSessionFactoryBean

  • Create HibernateTransactionManager bean in Spring configuration

  • Use @Transactional annotation for database transactions

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Which ORM is better and why

Ans.

There is no one-size-fits-all answer to this question as it depends on the specific project requirements.

  • ORMs like Hibernate are popular for Java projects

  • Django ORM is widely used for Python projects

  • Entity Framework is commonly used for .NET projects

  • Consider factors like performance, ease of use, and community support when choosing an ORM

  • Ultimately, the best ORM is the one that fits the project's specific needs

View 1 answer

Q10. Difference between MVVM vs MVC. What is Live data?

Ans.

MVVM is a design pattern that separates UI from business logic. Live data is observable data that updates UI automatically.

  • MVC separates UI, business logic, and data. MVVM adds a ViewModel layer to handle UI logic.

  • Live data is a type of observable data that updates UI automatically when the data changes.

  • MVVM and Live data are commonly used in Android development with the Android Architecture Components.

  • MVC is commonly used in web development with frameworks like Ruby on Rails...read more

Add your answer

Q11. What do you do incase of bot execution failure

Ans.

In case of bot execution failure, I would identify the root cause and fix it as soon as possible.

  • Check the logs to identify the error message and the point of failure

  • Analyze the code to identify the root cause of the failure

  • Fix the issue and test the bot again to ensure it is working as expected

  • Implement measures to prevent similar failures in the future

Add your answer

Q12. What is the difference between Map and flatMap

Ans.

Map transforms each element of a collection, while flatMap transforms each element into a new collection.

  • Map applies a function to each element of a collection and returns a new collection with the transformed elements.

  • FlatMap applies a function to each element of a collection and returns a new collection by concatenating the resulting collections.

  • Map returns a collection with the same number of elements as the original collection, while flatMap can return a collection with a...read more

Add your answer

Q13. what are the steps you will take while updating a build and how you will do rollback

Ans.

Steps for updating a build and performing rollback

  • Create a backup of the current build before making any changes

  • Update the build with the necessary changes and test thoroughly

  • If issues are found, identify the cause and plan for rollback

  • Rollback by restoring the backup of the previous build

  • Communicate the rollback to the team and document the process

Add your answer

Q14. Concept Of service. Type of service. Difference Between Job scheduler and work Manager.

Ans.

Service is a software component that performs a specific task. Job scheduler and work manager are types of services used in software development.

  • A service is a self-contained component that performs a specific task.

  • Types of services include web services, microservices, and background services.

  • Job scheduler is a service that schedules and executes jobs at specific times or intervals.

  • Work manager is a service that manages and prioritizes work requests.

  • Job scheduler is time-base...read more

Add your answer

Q15. What kind of applications does AI have and how can you use them on the job?

Ans.

AI applications include natural language processing, image recognition, recommendation systems, and autonomous vehicles.

  • Natural language processing for chatbots and virtual assistants

  • Image recognition for facial recognition and object detection

  • Recommendation systems for personalized content suggestions

  • Autonomous vehicles for self-driving cars

Add your answer

Q16. What is multi Threading. Oops concept.

Ans.

Multithreading is the ability of a CPU to execute multiple threads concurrently.

  • Multithreading allows for parallel processing and can improve performance.

  • In object-oriented programming, multithreading can be implemented using the Thread class.

  • Examples of multithreaded applications include web servers and video games.

Add your answer

Q17. Difference between arraylist and linked list?

Ans.

ArrayList is a resizable array implementation while LinkedList is a doubly linked list implementation.

  • ArrayList is faster for accessing elements while LinkedList is faster for adding or removing elements.

  • ArrayList uses contiguous memory while LinkedList uses non-contiguous memory.

  • ArrayList is better for random access while LinkedList is better for sequential access.

  • Example: ArrayList - List names = new ArrayList<>(); LinkedList - List names = new LinkedList<>();

Add your answer

Q18. Use interface name before method name while implementing the method in class. Ex- interfacename.methodname()

Ans.

Using interface name before method name while implementing the method in class.

  • This is a recommended practice in Java programming.

  • It helps in avoiding naming conflicts and improves code readability.

  • Example: MyInterface.myMethod();

Add your answer

Q19. How to deploy ivr application in servers.

Ans.

IVR application can be deployed in servers using various deployment methods.

  • Choose a deployment method based on the application requirements and server environment.

  • Common deployment methods include manual deployment, automated deployment, and containerization.

  • Ensure that all necessary dependencies and configurations are included in the deployment package.

  • Test the application thoroughly after deployment to ensure it is functioning correctly.

Add your answer

Q20. How to implicitly call an interface method?

Ans.

To implicitly call an interface method, create an object of the implementing class and assign it to the interface type.

  • Create an interface with the desired method signature

  • Create a class that implements the interface

  • Create an object of the implementing class and assign it to the interface type

  • Call the method on the interface object

  • The implementing class's method will be implicitly called

Add your answer

Q21. What is Can FD and why it is required.

Ans.

CAN FD stands for Controller Area Network Flexible Data Rate, it is required for high-speed communication in automotive and industrial applications.

  • CAN FD allows for higher data rates compared to traditional CAN networks

  • It is necessary for transmitting large amounts of data quickly and efficiently

  • Used in applications where real-time communication and reliability are crucial, such as automotive ECUs

  • Example: CAN FD is used in modern cars for transmitting sensor data, control si...read more

Add your answer

Q22. what are access ties available in azure storage

Ans.

Access tiers in Azure Storage include hot, cool, and archive tiers.

  • Hot access tier: Optimized for frequently accessed data with higher storage costs.

  • Cool access tier: Optimized for infrequently accessed data with lower storage costs.

  • Archive access tier: Optimized for rarely accessed data with the lowest storage costs.

  • Data in the archive tier may have longer retrieval times compared to hot and cool tiers.

Add your answer

Q23. how will you handle errors in prod environment

Ans.

I will handle errors in prod environment by implementing proper error logging, monitoring, and alerting systems.

  • Implement comprehensive error logging to track errors and their root causes

  • Set up monitoring tools to detect errors in real-time and alert the team

  • Establish a process for prioritizing and resolving errors based on impact and severity

  • Regularly review and analyze error logs to identify patterns and prevent future occurrences

Add your answer

Q24. What is patch and how to create and apply

Ans.

A patch is a file that contains changes to a software program. It can be created using a diff tool and applied using a patch tool.

  • A patch file contains the changes made to a software program.

  • It can be created using a diff tool like Git diff or SVN diff.

  • The patch file can be applied using a patch tool like Git apply or SVN patch.

  • Patches are commonly used to update software programs or fix bugs.

  • Patches can also be used to customize software programs by adding or removing featur...read more

Add your answer

Q25. Write a program in java to count the occurrence of each character in a string

Ans.

Program in Java to count occurrence of each character in a string

  • Create a HashMap to store characters and their counts

  • Iterate through the string and update the counts in the HashMap

  • Print the characters and their counts from the HashMap

Add your answer

Q26. Types of annotations in spring boot?

Ans.

Spring Boot has several annotations for different purposes.

  • Spring Boot annotations are used for configuration, mapping, security, testing, etc.

  • @Configuration, @RestController, @RequestMapping, @Autowired, @Test are some commonly used annotations.

  • Annotations help in reducing boilerplate code and make the code more readable and maintainable.

Add your answer

Q27. Under which principle does VLAN work?

Ans.

VLAN works under the principle of network segmentation.

  • VLAN separates a physical network into multiple logical networks.

  • It improves network performance, security, and management.

  • VLAN tags packets with a unique identifier to identify the network they belong to.

  • Example: VLAN can be used to separate guest and employee networks in a company.

Add your answer

Q28. What is the purpose of static keyword in Java

Ans.

Static keyword in Java is used to create class-level variables and methods that can be accessed without creating an instance of the class.

  • Static variables are shared among all instances of a class

  • Static methods can be called without creating an object of the class

  • Static keyword can be used to create static blocks for initializing static variables

  • Static keyword can also be used to create static nested classes

Add your answer

Q29. Write testcases for Whatsapp video calling feature

Ans.

Testcases for Whatsapp video calling feature

  • Test if video call can be initiated successfully

  • Test if video call can be accepted/rejected by recipient

  • Test if video call quality is good

  • Test if video call can be ended properly

  • Test if video call can be switched to voice call

  • Test if video call works on different network connections (3G, 4G, Wi-Fi)

  • Test if video call works on different devices (Android, iOS)

  • Test if video call can be made in a group chat

Add your answer

Q30. How does hash map internally work in Java?

Ans.

HashMap in Java uses an array of linked lists to store key-value pairs, with keys being hashed to determine the index in the array.

  • HashMap contains an array of linked lists where each element is a key-value pair

  • When a key is inserted, its hash code is used to determine the index in the array

  • If multiple keys hash to the same index, they are stored in a linked list at that index

  • To retrieve a value, the key's hash code is used to find the correct index and then search the linked...read more

Add your answer

Q31. What is current CTC and expected CTC

Ans.

The question asks about the candidate's current and expected salary.

  • Be honest and transparent about your current salary.

  • Research the market rates for your role and level of experience to determine a reasonable expected salary.

  • Consider other benefits and perks besides the base salary.

  • Avoid discussing salary expectations too early in the interview process.

  • Focus on the value you can bring to the company rather than just the salary.

Add your answer

Q32. What are the services in Drupal?

Ans.

Drupal provides various services to extend its functionality and features.

  • Drupal core services such as database, cache, and logging

  • Third-party services like RESTful web services, search, and email

  • Custom services created by developers to meet specific needs

  • Services can be accessed through Drupal's Service Container

Add your answer

Q33. Different design patterns

Ans.

Design patterns are reusable solutions to common software problems.

  • Creational patterns: Singleton, Factory, Abstract Factory

  • Structural patterns: Adapter, Decorator, Facade

  • Behavioral patterns: Observer, Strategy, Command

  • Architectural patterns: Model-View-Controller, Model-View-ViewModel

  • Concurrency patterns: Thread Pool, Producer-Consumer, Future

Add your answer

Q34. Write a code for displaying list of employees using stream api

Ans.

Display list of employees using stream api

  • Use Stream API to iterate through the list of employees

  • Use forEach() method to display each employee's information

  • Example: employees.stream().forEach(employee -> System.out.println(employee));

Add your answer

Q35. Explain the differences between regression testing and retesting

Ans.

Regression testing is testing the entire application after changes, while retesting is testing a specific bug fix.

  • Regression testing involves testing the entire application to ensure that new code changes have not negatively impacted existing functionality.

  • Retesting involves testing a specific bug fix to ensure that the issue has been resolved.

  • Regression testing is typically done after every code change, while retesting is done after a bug fix.

  • Regression testing helps ensure ...read more

Add your answer

Q36. coding for list comparator in object class for employee based on salary and name

Ans.

Implement list comparator in object class for employees based on salary and name

  • Override the compareTo method in the Employee class to compare based on salary and name

  • Use Comparator interface to implement custom sorting logic

  • Example: Employee class with fields salary and name, compareTo method comparing first by salary then by name

Add your answer

Q37. How to create custom module in drupal

Ans.

To create a custom module in Drupal, follow these steps:

  • Create a new folder in the 'modules' directory of your Drupal installation

  • Create a .info.yml file in the new folder with module information

  • Create a .module file in the new folder with module code

  • Enable the module in the Drupal admin interface

  • Clear the cache to ensure Drupal recognizes the new module

Add your answer

Q38. Advantages of reactjs, hooks, html, css, version of react and difference

Ans.

Advantages of ReactJS, hooks, HTML, CSS, version of React and their differences.

  • ReactJS is a popular JavaScript library for building user interfaces.

  • Hooks allow for stateful logic in functional components.

  • HTML and CSS are used for structuring and styling web pages.

  • React version 16 introduced features like error boundaries and portals.

  • React version 17 focused on improving the upgrade process.

  • ReactJS is faster than other frameworks due to its virtual DOM.

  • ReactJS has a large and...read more

Add your answer

Q39. What are the Trigger in Salesforce?

Ans.

Triggers are automated actions that execute when certain events occur in Salesforce.

  • Triggers are used to perform custom actions before or after specific events occur in Salesforce.

  • They can be used to update related records, send email notifications, or perform other custom logic.

  • Triggers can be written in Apex code and are associated with a specific object in Salesforce.

  • Examples of trigger events include record creation, deletion, or update.

  • Triggers can also be used to enforc...read more

View 1 answer

Q40. SAP master data and process of plant mintenace

Ans.

The SAP master data is used to maintain plant maintenance processes.

  • SAP master data is used to store information about equipment, functional locations, and maintenance plans.

  • Plant maintenance processes involve creating and scheduling maintenance orders, performing inspections, and recording maintenance history.

  • The SAP system can generate notifications for maintenance tasks based on predefined criteria.

  • Maintenance data can be analyzed to identify trends and improve maintenance...read more

Add your answer

Q41. Writing the Test case for ADAS ECU.

Ans.

Writing test cases for ADAS ECU involves verifying functionality and performance of the electronic control unit.

  • Identify the input and output requirements of the ADAS ECU

  • Create test cases to cover different scenarios such as normal operation, edge cases, and failure modes

  • Include test cases for communication protocols, sensor inputs, and system responses

  • Verify the integration of ADAS ECU with other components in the system

  • Perform regression testing to ensure new changes do not...read more

Add your answer

Q42. Find average of integer arrays using java 8 streams

Ans.

Calculate average of integer arrays using Java 8 streams

  • Use IntStream to convert the array to a stream of integers

  • Use average() method to calculate the average of the integers

  • Collect the result using getAsDouble() method

Add your answer

Q43. Document verification process explanation

Ans.

Document verification process involves verifying the authenticity and accuracy of documents submitted by individuals.

  • Verify the identity of the individual by checking their photo ID

  • Check the validity of the document by looking for security features such as watermarks or holograms

  • Cross-reference the information on the document with other sources to ensure consistency

  • Use automated tools like OCR (Optical Character Recognition) to extract and verify text from documents

Add your answer

Q44. Write program to read and write from excel

Ans.

Program to read and write data from Excel using a library like Apache POI or Openpyxl.

  • Use a library like Apache POI for Java or Openpyxl for Python to interact with Excel files.

  • Read data from Excel file using library functions and write data back to Excel file after processing.

  • Handle exceptions like file not found or incorrect format when reading or writing to Excel.

Add your answer

Q45. What is MES?

Ans.

MES stands for Manufacturing Execution System, a software system used to manage and monitor production processes.

  • MES helps to track and optimize production processes in real-time.

  • It collects data from various sources such as machines, sensors, and operators.

  • MES provides visibility into the production process, enabling better decision-making and improved efficiency.

  • Examples of MES software include Siemens Opcenter, SAP Manufacturing Execution, and Rockwell Automation FactoryTa...read more

Add your answer

Q46. How to use control break statement?

Ans.

Control break statement is used to break out of a loop based on a certain condition.

  • Control break statement is typically used in loops to exit the loop prematurely based on a specific condition.

  • It helps in improving the efficiency of the code by avoiding unnecessary iterations.

  • Example: Using 'break' statement in a loop to exit when a certain value is reached.

Add your answer

Q47. Explain the CI/CD pipeline you have worked on?

Ans.

Implemented a CI/CD pipeline using Jenkins, Docker, and Kubernetes for automated testing and deployment.

  • Utilized Jenkins for continuous integration to automatically build and test code changes

  • Used Docker for containerization of applications to ensure consistency across environments

  • Deployed applications using Kubernetes for efficient scaling and management

  • Integrated automated testing tools like Selenium or JUnit for quality assurance

  • Implemented version control with Git to trac...read more

Add your answer

Q48. Difference bewtween LKA and LDW.

Ans.

LKA stands for Lane Keep Assist, while LDW stands for Lane Departure Warning.

  • LKA helps keep the vehicle centered in its lane by providing steering input if necessary.

  • LDW alerts the driver if the vehicle is unintentionally drifting out of its lane.

  • LKA is more proactive in assisting the driver with lane keeping, while LDW is more of a warning system.

  • Some vehicles may have both LKA and LDW features integrated for enhanced safety.

Add your answer

Q49. Aspice model and itr requirement.

Ans.

ASPICE (Automotive SPICE) model is a framework for software development in the automotive industry. ITR (Integrated Test Requirement) is a part of ASPICE focusing on testing requirements.

  • ASPICE is a framework for software development in the automotive industry

  • ITR is a part of ASPICE that focuses on testing requirements

  • ASPICE helps in ensuring high-quality software development in automotive projects

Add your answer

Q50. Unix command procedure and functional and queries

Ans.

Explaining Unix command procedure and functional queries

  • Unix commands are used to perform various tasks on the Unix operating system

  • Commands can be executed in the terminal or through shell scripts

  • Functional queries involve retrieving specific information from a database

  • Queries can be written in SQL or other query languages

  • Unix commands can be used to manipulate and analyze data in databases

Add your answer

Q51. Use Project Design Pattern.

Ans.

Project Design Pattern is a reusable solution to a commonly occurring problem within a given context.

  • Design patterns help in creating flexible, reusable, and maintainable code.

  • Some commonly used design patterns are Singleton, Factory, Observer, and Decorator.

  • Design patterns can be categorized into three types: Creational, Structural, and Behavioral.

  • Choosing the right design pattern depends on the problem at hand and the context in which it is being used.

Add your answer

Q52. Conversion operation in string

Ans.

Conversion operation in string

  • String conversion can be done using built-in functions like parseInt(), parseFloat(), toString(), etc.

  • Conversion can also be done using regular expressions and string manipulation techniques.

  • It is important to handle errors and edge cases while performing string conversion.

Add your answer

Q53. What are closures in javascriot

Ans.

Closures are functions that have access to variables in their outer scope, even after the outer function has returned.

  • Closures are created when a function is defined inside another function.

  • The inner function has access to the outer function's variables and parameters.

  • Closures can be used to create private variables and methods.

  • Closures can also be used to create functions with pre-set arguments.

Add your answer

Q54. Joins Difference between delete and truncate

Ans.

Delete removes rows one by one, while truncate removes all rows at once.

  • Delete is a DML command, while truncate is a DDL command.

  • Delete can be rolled back, while truncate cannot be rolled back.

  • Delete fires triggers, while truncate does not fire triggers.

Add your answer

Q55. How error handling in ansible

Ans.

Error handling in Ansible involves using various modules and strategies to manage and respond to errors during playbook execution.

  • Use the 'failed_when' directive in tasks to specify conditions that should result in a task failure.

  • Utilize the 'ignore_errors' directive to continue executing tasks even if errors occur.

  • Implement error handling with 'rescue' and 'always' blocks in playbooks to handle errors and cleanup tasks.

  • Use the 'failed_when' and 'changed_when' directives to c...read more

Add your answer

Q56. what is fai-fast and fai-safe

Ans.

FAI-Fast and FAI-Safe are two different approaches to Fault-Avoidance and Isolation in computer systems.

  • FAI-Fast is a quick and simple approach to fault-avoidance that involves shutting down the system as soon as a fault is detected.

  • FAI-Safe is a more complex approach that involves isolating the fault and allowing the system to continue running in a degraded state.

  • FAI-Safe is often used in safety-critical systems, such as medical devices or aircraft control systems.

  • FAI-Fast i...read more

Add your answer

Q57. Basic data flow in MES

Ans.

MES data flow involves capturing, processing and analyzing data from manufacturing operations.

  • MES collects data from various sources such as machines, sensors, and operators

  • The data is then processed and analyzed to provide insights into the manufacturing process

  • MES also facilitates communication between different systems and departments

  • Examples of MES include Wonderware MES, SAP MES, and Rockwell MES

Add your answer

Q58. Live coding round. Largest common prefix

Ans.

Find the largest common prefix among an array of strings

  • Iterate through the characters of the first string and compare with the corresponding characters of other strings

  • Stop when a mismatch is found or when reaching the end of any string

  • Return the prefix found so far

Add your answer

Q59. Pop and push operation in perl

Ans.

Pop and push operations are used to add or remove elements from an array in Perl.

  • The push operation adds one or more elements to the end of an array.

  • Example: push(@array, 'element1', 'element2');

  • The pop operation removes and returns the last element of an array.

  • Example: my $last_element = pop(@array);

Add your answer

Q60. how to add system service

Ans.

To add a system service, you need to create a service unit file and enable it using systemctl.

  • Create a service unit file in /etc/systemd/system directory with the necessary configuration

  • Reload systemd manager configuration using systemctl daemon-reload

  • Enable the service using systemctl enable

  • Start the service using systemctl start

  • Check the status of the service using systemctl status

Add your answer

Q61. how to create system app

Ans.

To create a system app, you need to design the app architecture, implement the functionality, and test it thoroughly.

  • Define the requirements and goals of the system app.

  • Design the architecture of the app, including the user interface and backend functionality.

  • Implement the app using programming languages and frameworks suitable for the project.

  • Test the app thoroughly to ensure it functions correctly and meets the requirements.

  • Deploy the app to the desired platform for users t...read more

Add your answer

Q62. Explain about Automation Framework

Ans.

Automation framework is a set of guidelines, best practices, tools, and libraries used to automate testing of software applications.

  • Provides structure and guidelines for automated testing

  • Helps in organizing test scripts and test data

  • Supports reusability of code and components

  • Facilitates easy maintenance and scalability

  • Examples: Selenium WebDriver, TestNG, Cucumber

Add your answer

Q63. What is performance tuning

Ans.

Performance tuning is the process of optimizing software to improve its speed, efficiency, and resource utilization.

  • Identifying bottlenecks and areas of inefficiency

  • Optimizing algorithms and data structures

  • Reducing I/O operations and network latency

  • Caching frequently accessed data

  • Profiling and benchmarking to measure improvements

  • Tuning hardware and infrastructure

  • Testing and validating changes before deployment

Add your answer

Q64. caliberation order and use

Ans.

Calibration order and use in software engineering

  • Calibration order refers to the sequence in which instruments are calibrated

  • Calibration is the process of adjusting an instrument to ensure accurate measurements

  • Calibration order is important to ensure that all instruments are calibrated correctly

  • Calibration is used to maintain the accuracy of instruments over time

  • Calibration is important in industries such as aerospace, automotive, and medical

Add your answer

Q65. why pod is ephemeral

Ans.

Pod is ephemeral due to its temporary nature and dynamic lifecycle.

  • Pods are designed to be easily created, destroyed, and replaced.

  • Pods do not have persistent storage by default.

  • Pods are scheduled and managed by the Kubernetes control plane.

  • Pods can be automatically rescheduled to different nodes in case of failures.

Add your answer

Q66. Indexing in sql

Ans.

Indexing in SQL improves query performance by creating a data structure that allows for faster data retrieval.

  • Indexing involves creating a separate data structure that contains the indexed columns and their corresponding row locations.

  • Indexes can be created on one or multiple columns.

  • Indexes can be clustered or non-clustered.

  • Clustered indexes determine the physical order of data in a table, while non-clustered indexes do not.

  • Indexes can be created using the CREATE INDEX state...read more

Add your answer

Q67. Which stream you are working

Ans.

I am currently working in the software development stream.

  • Working in software development stream

  • Experience in coding and programming

  • Familiar with various programming languages

Add your answer

Q68. What is your expected CTC

Ans.

My expected CTC is based on my experience, skills, and the market rate for Senior Software Engineers.

  • My expected CTC is in line with industry standards for Senior Software Engineers.

  • I have taken into consideration my years of experience and expertise in software development.

  • I am open to negotiation based on the overall compensation package offered by the company.

Add your answer

Q69. File operation and syntax

Ans.

File operation and syntax

  • File operations include opening, reading, writing, and closing files

  • Syntax for opening a file: file = open('filename', mode)

  • Syntax for reading a file: file.read()

  • Syntax for writing to a file: file.write('content')

  • Syntax for closing a file: file.close()

Add your answer

Q70. Database module used in perl

Ans.

DBI is the most commonly used database module in Perl.

  • DBI is a database-independent interface for Perl

  • It provides a consistent API for accessing different databases

  • DBD modules provide drivers for specific databases, such as DBD::mysql for MySQL

  • DBI supports transactions, prepared statements, and more

Add your answer

Q71. Internal functioning of Hash map

Ans.

Hash map is a data structure that stores key-value pairs and uses a hash function to map keys to their corresponding values.

  • Hash map uses a hash function to determine the index of the key-value pair in the underlying array.

  • Collisions can occur when two keys hash to the same index, which can be resolved using techniques like chaining or open addressing.

  • Hash maps have constant time complexity O(1) for insertion, deletion, and lookup operations on average, but can degrade to O(n...read more

Add your answer

Q72. 2. N-Queen problem back tracking

Ans.

The N-Queen problem is to place N chess queens on an NxN board so that no two queens threaten each other.

  • Backtracking is a common algorithmic technique used to solve the N-Queen problem.

  • The algorithm tries to place a queen in each row of the board, and backtracks if it cannot find a valid position.

  • The solution can be optimized by using bit manipulation to check for conflicts between queens.

  • The time complexity of the algorithm is O(N!), which can be improved using heuristics o...read more

Add your answer

Q73. Bootstrap react app without CRA

Ans.

Bootstraping a React app without Create React App (CRA)

  • Set up webpack configuration for bundling

  • Install necessary dependencies like react, react-dom, babel, etc.

  • Configure Babel for transpiling JSX and ES6 syntax

  • Set up a development server for hot reloading

  • Create a basic folder structure for components, styles, etc.

Add your answer

Q74. 1. Describle design patterns.

Ans.

Design patterns are reusable solutions to common software design problems.

  • Design patterns provide a common language for developers to communicate about solutions to common problems.

  • They can improve the quality, maintainability, and scalability of software.

  • Examples include the Singleton pattern, Factory pattern, and Observer pattern.

View 1 answer

Q75. Partitioning and clustering difference

Ans.

Partitioning divides data into smaller chunks for easier management, while clustering groups similar data together for efficient retrieval.

  • Partitioning is dividing data into smaller subsets for easier management and scalability.

  • Clustering is grouping similar data together to improve query performance.

  • Partitioning is often used in databases to distribute data across multiple servers.

  • Clustering is used in data mining to identify patterns and relationships among data points.

Add your answer

Q76. View and materialised view difference

Ans.

Difference between view and materialized view

  • A view is a virtual table that does not store data, while a materialized view is a physical table that stores data

  • Views are dynamically generated while materialized views are precomputed and stored

  • Materialized views are faster for read-heavy workloads but slower for write-heavy workloads

  • Materialized views need to be refreshed periodically to ensure data consistency

Add your answer

Q77. Explain about polymorphism

Ans.

Polymorphism is the ability of a single function or method to operate on different types of data.

  • Polymorphism allows objects of different classes to be treated as objects of a common superclass.

  • There are two types of polymorphism: compile-time (method overloading) and runtime (method overriding).

  • Example of compile-time polymorphism: function overloading in C++.

  • Example of runtime polymorphism: method overriding in Java.

Add your answer

Q78. Explain about Pega testing

Ans.

Pega testing is a software testing process specifically designed for applications built on the Pega platform.

  • Pega testing involves testing the functionality, performance, and security of applications developed using Pega technology.

  • It includes testing various components such as user interfaces, business logic, integrations, and workflows.

  • Test cases are designed to validate the behavior of Pega applications based on business requirements.

  • Common testing tools used for Pega test...read more

Add your answer

Q79. Advantage of Accumulator

Ans.

Accumulator is a register that stores intermediate results of arithmetic and logic operations.

  • Accumulator reduces the number of memory accesses required for arithmetic operations.

  • It speeds up the execution of arithmetic and logic operations.

  • It is used in many microprocessors and microcontrollers.

  • For example, in the Intel 8085 microprocessor, the accumulator is an 8-bit register used for arithmetic and logic operations.

Add your answer

Q80. What is Hot fix

Ans.

A hot fix is a software patch designed to fix a specific issue or bug in a program without disrupting the overall functionality.

  • Hot fixes are typically small updates that address critical issues or vulnerabilities.

  • They are often released quickly to address urgent problems without waiting for a full software update.

  • Hot fixes are usually temporary solutions until a more permanent fix can be implemented.

  • Examples of hot fixes include security patches for software vulnerabilities ...read more

Add your answer

Q81. What is C++

Ans.

C++ is a high-level programming language used for developing system software, application software, device drivers, and video games.

  • C++ is an extension of the C programming language.

  • It supports object-oriented programming concepts like classes, inheritance, polymorphism, and encapsulation.

  • C++ is used in developing operating systems, browsers, databases, and other software applications.

  • It is known for its performance and efficiency in memory management.

  • Examples of popular soft...read more

Add your answer

Q82. What is Link List

Ans.

A data structure that stores a sequence of elements in a linear order.

  • Consists of nodes that contain data and a pointer to the next node.

  • Can be singly linked or doubly linked.

  • Used for implementing stacks, queues, and hash tables.

  • Example: Singly linked list - 1 -> 2 -> 3 -> null

  • Example: Doubly linked list - null <- 1 <-> 2 <-> 3 -> null

Add your answer

Q83. First line of perl

Ans.

The first line of Perl typically starts with a shebang and specifies the path to the Perl interpreter.

  • The shebang line is used to tell the system which interpreter to use to run the script

  • The shebang line starts with #! followed by the path to the Perl interpreter

  • Example: #!/usr/bin/perl

Add your answer

Q84. Temporary stored procedures?

Ans.

Temporary stored procedures are stored in tempdb and are only available during the session in which they were created.

  • Temporary stored procedures are created using the CREATE PROCEDURE statement with the # prefix for the procedure name.

  • They are only available to the session in which they were created and are automatically dropped when the session ends.

  • They can be useful for performing complex data manipulation within a single session without cluttering up the master database ...read more

Add your answer

Q85. what is idempotency

Ans.

Idempotency is the property of an operation where applying it multiple times has the same effect as applying it once.

  • Idempotency ensures that repeating the same operation multiple times will not change the result.

  • Examples include GET requests in RESTful APIs, where multiple identical requests will return the same response.

  • Idempotency is important in distributed systems to prevent duplicate operations.

  • PUT and DELETE requests in RESTful APIs should be idempotent.

Add your answer

Q86. explain boot sequence

Ans.

Boot sequence is the process of starting up a computer system.

  • Power on the computer

  • BIOS/UEFI initialization

  • Load bootloader

  • Load operating system kernel

  • Initialize hardware and peripherals

  • Launch user interface

Add your answer

Q87. what is clouser

Ans.

A closure is a function that has access to its own scope, as well as the outer scope in which it was defined.

  • A closure allows a function to access variables from its outer function even after the outer function has finished executing.

  • Closures are commonly used in JavaScript for data encapsulation and creating private variables.

  • Example: const outerFunction = () => { const outerVar = 'I am outer'; return () => { console.log(outerVar); }; }; const innerFunction = outerFunction()...read more

Add your answer

Q88. What is virsual dom

Ans.

Virtual DOM is a lightweight copy of the actual DOM in memory, used for efficient updates in web development.

  • Virtual DOM is a concept used in frameworks like React to improve performance by minimizing actual DOM manipulations.

  • Changes are first made to the virtual DOM, then compared with the actual DOM to only update what has changed.

  • This process helps reduce re-rendering of the entire page, leading to faster and more efficient web applications.

Add your answer

Q89. Explain project

Ans.

Developed a web-based project management tool for tracking tasks and deadlines

  • Created user-friendly interface for adding, editing, and deleting tasks

  • Implemented notifications for upcoming deadlines

  • Integrated with calendar API for scheduling tasks

Add your answer

Q90. Csrf token in CodeIgniter

Ans.

CSRF token in CodeIgniter is a security feature to prevent cross-site request forgery attacks.

  • CSRF protection is enabled by default in CodeIgniter.

  • To generate a CSRF token, use the form_open() function in views.

  • To validate the CSRF token, use the form_validation library in controllers.

Add your answer

Q91. Reverse a string

Ans.

Reverse a string by iterating through the characters and swapping them

  • Create a function that takes a string as input

  • Initialize two pointers, one at the beginning and one at the end of the string

  • Swap the characters at the two pointers and move them towards the center until they meet

Add your answer

Q92. Xxe tage explain

Ans.

XXE stands for XML External Entity and is a type of attack that exploits vulnerabilities in XML parsers.

  • XXE attacks involve injecting malicious XML entities into an XML document to exploit vulnerabilities in the parser.

  • These attacks can lead to sensitive data disclosure, server-side request forgery, and remote code execution.

  • Preventing XXE attacks involves validating and sanitizing input, disabling external entity processing, and using secure XML parsers.

Add your answer

Q93. Soap vs RESTFUL API

Ans.

SOAP is a protocol, RESTful is an architectural style for APIs.

  • SOAP is a protocol with strict standards for communication

  • RESTful APIs are more flexible and use standard HTTP methods

  • SOAP is XML-based, RESTful APIs can use various formats like JSON

  • SOAP has built-in security features, RESTful APIs rely on external mechanisms

  • SOAP is more suitable for complex operations, RESTful APIs are simpler and more lightweight

Add your answer

Q94. define microservices

Ans.

Microservices are a software development technique where applications are composed of small, independent services that communicate over well-defined APIs.

  • Microservices break down applications into smaller, loosely coupled services

  • Each service is responsible for a specific function and can be developed, deployed, and scaled independently

  • Communication between services is typically done through APIs, often using lightweight protocols like HTTP or messaging queues

  • Microservices al...read more

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at null

based on 54 interviews in the last 1 year
3 Interview rounds
Technical Round 1
Technical Round 2
HR Round
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Senior Software Engineer Interview Questions from Similar Companies

3.7
 • 82 Interview Questions
3.9
 • 20 Interview Questions
4.1
 • 17 Interview Questions
3.5
 • 11 Interview Questions
3.2
 • 10 Interview Questions
3.9
 • 10 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter