Add office photos
Employer?
Claim Account for FREE

Temenos

3.3
based on 808 Reviews
Video summary
Filter interviews by

50+ GE Vernova Interview Questions and Answers

Updated 25 Feb 2025
Popular Designations

Q1. In exception handling how many ways can we throw exception

Ans.

There are two ways to throw an exception in exception handling.

  • Exceptions can be thrown using the throw keyword.

  • Exceptions can also be thrown implicitly by the runtime system.

  • Examples of explicit throwing include throw new Exception() and throw new IOException().

  • Examples of implicit throwing include division by zero or null pointer dereference.

View 1 answer

Q2. How do you do dynamic memory allocation in C,C++? what is the difference?

Ans.

Dynamic memory allocation in C/C++ is done using malloc(), calloc(), realloc() functions. C++ also has new and delete operators.

  • malloc() allocates memory block of specified size

  • calloc() allocates memory block and initializes it to zero

  • realloc() changes the size of previously allocated memory block

  • new operator in C++ allocates memory and calls constructor

  • delete operator in C++ deallocates memory and calls destructor

Add your answer

Q3. How to find the string in an array of strings which are arranged in sorted order in the array?

Ans.

To find a string in a sorted array of strings.

  • Use binary search algorithm to search for the string in the array.

  • Compare the search string with the middle element of the array.

  • If the search string is less than the middle element, search in the left half of the array.

  • If the search string is greater than the middle element, search in the right half of the array.

  • Repeat the process until the string is found or the search space is exhausted.

Add your answer

Q4. What are all the Os QT supports ? do i need to compile again for every Operating system?

Ans.

QT supports multiple operating systems and cross-compilation is possible.

  • QT supports Windows, macOS, Linux, Android, iOS, and many other operating systems.

  • Cross-compilation is possible, meaning you can compile for different operating systems on a single machine.

  • QT also supports embedded systems like Raspberry Pi and BeagleBone.

  • QT provides pre-built binaries for some operating systems, but for others, you may need to compile it yourself.

  • QT also provides tools like QT Creator a...read more

Add your answer
Discover GE Vernova interview dos and don'ts from real experiences

Q5. Single ton class also? How to create the singleton and how to delete the singleton object?

Ans.

Singleton class is a design pattern that restricts the instantiation of a class to one object.

  • To create a singleton, we need to make the constructor private and provide a static method to get the instance of the class.

  • To delete the singleton object, we can simply set the instance to null.

  • Singletons are useful when we need to ensure that only one instance of a class exists throughout the application.

  • Example: Logger class, Database connection class, Configuration class.

Add your answer

Q6. implement a simple copy constructor. why to we implement our own

Ans.

A copy constructor is used to create a new object with the same values as an existing object. We implement our own to ensure proper copying of data members.

  • A copy constructor is needed when we want to create a new object with the same values as an existing object.

  • If we don't implement our own copy constructor, the default copy constructor provided by the compiler may not copy data members properly.

  • We can implement our own copy constructor to ensure proper copying of data memb...read more

Add your answer
Are these interview questions helpful?

Q7. Which design patterns you used and why explain?

Ans.

I have used the Singleton and Factory design patterns in my previous projects.

  • Singleton pattern was used to ensure only one instance of a class is created and provide a global point of access to it.

  • Factory pattern was used to create objects without exposing the instantiation logic to the client and provide a way to create objects of a family without specifying their concrete classes.

Add your answer

Q8. Difference between copy constructor and assignment operator

Ans.

Copy constructor creates a new object by copying an existing object, while assignment operator assigns the value of an existing object to another object.

  • Copy constructor is used to initialize a new object with the values of an existing object.

  • Assignment operator is used to assign the value of an existing object to another object.

  • Copy constructor is called when a new object is created from an existing object.

  • Assignment operator is called when an existing object is assigned a n...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. How to find linkedlist is circualar or not?

Ans.

To check if a linked list is circular, use two pointers, one moving at twice the speed of the other. If they meet, the list is circular.

  • Use two pointers, one moving at twice the speed of the other

  • If the faster pointer catches up to the slower pointer, the list is circular

  • If the faster pointer reaches the end of the list, the list is not circular

Add your answer

Q10. Which version of Qt you used?

Ans.

I have used Qt version 5.12.3 for my previous project.

  • Qt version 5.12.3 was used in my previous project

  • I have experience working with Qt 5.15.2 as well

  • I am familiar with the features and functionalities of Qt 5.12.3

Add your answer

Q11. Why we use QT framework?

Ans.

QT framework is used for developing cross-platform applications with a single codebase.

  • QT provides a wide range of libraries and tools for developing GUI applications.

  • QT supports multiple platforms including Windows, Linux, macOS, Android, and iOS.

  • QT has a large community and extensive documentation.

  • QT is written in C++ and supports other programming languages like Python and Java.

  • QT is used by companies like Autodesk, Google, and LG for developing their applications.

Add your answer

Q12. Find the Merge point in 2 linkedlists?

Ans.

Find the merge point of 2 linked lists.

  • Traverse both lists and find their lengths

  • Move the pointer of the longer list to the same distance as the shorter list

  • Move both pointers until they meet at the merge point

  • If there is no merge point, return null

Add your answer

Q13. What is RTTI?

Ans.

RTTI stands for Run-Time Type Identification.

  • RTTI is a feature in C++ that allows the type of an object to be determined at runtime.

  • It is used to implement dynamic_cast, typeid, and exception handling.

  • RTTI can be used to check if an object is of a certain type before casting it.

  • It can also be used to determine the type of an object in order to perform specific operations on it.

View 1 answer

Q14. What is Qpointer?

Ans.

QPointer is a deprecated Qt class used for storing and managing pointers.

  • QPointer is used to avoid dangling pointers in Qt applications.

  • It is a template class that can be used with any QObject-derived class.

  • QPointer is now deprecated and replaced by QWeakPointer.

  • QPointer can be used to check if a QObject is still valid before accessing it.

View 1 answer

Q15. What are features of C language ?

Ans.

C is a procedural programming language with low-level memory access and a rich set of operators.

  • C is a compiled language

  • C has a simple syntax and a small set of keywords

  • C supports pointers and manual memory management

  • C has a rich set of operators and control structures

  • C is widely used for system programming, embedded systems, and game development

Add your answer

Q16. What is dpointer?

Ans.

dpointer is a Qt framework concept used for efficient memory management.

  • dpointer is a private implementation pointer.

  • It is used to hide implementation details from the public API.

  • dpointer allows for copy-on-write semantics.

  • It reduces memory usage and improves performance.

  • Example: QString uses dpointer to store its data.

  • Example: QSharedDataPointer is used to share data between objects.

Add your answer

Q17. What new innovative implementation will you do to the existing system.

Ans.

I would implement a machine learning algorithm to optimize the system's performance and efficiency.

  • Implementing a recommendation system to suggest personalized content to users based on their preferences and behavior.

  • Integrating natural language processing to improve the system's ability to understand and respond to user queries.

  • Utilizing predictive analytics to forecast future trends and make data-driven decisions for the system.

  • Introducing automated testing and deployment p...read more

Add your answer

Q18. Reverse string Program

Ans.

Reverse a given string using array of characters.

  • Create an empty array to store the reversed string.

  • Loop through the original string from end to start.

  • Push each character into the empty array.

  • Join the array to form the reversed string.

Add your answer

Q19. How would you create a movie theatre booking system.

Ans.

A movie theatre booking system can be created by designing a user-friendly interface for customers to browse movies, select showtimes, choose seats, and make payments.

  • Design a database to store movie information, showtimes, seating availability, and customer bookings.

  • Develop a front-end interface for customers to browse movies, select showtimes, and choose seats.

  • Implement a back-end system to handle seat reservations, payments, and sending booking confirmations.

  • Include featur...read more

Add your answer

Q20. What is inheritance, What is call by value and call by reference Write a program to find a given number is a primary number or not What is sql

Ans.

Inheritance is a concept in object-oriented programming where a class inherits properties and behaviors from another class.

  • Inheritance allows for code reusability and promotes a hierarchical relationship between classes.

  • Example: Class B inherits from Class A, so Class B can access all public and protected members of Class A.

  • Call by value passes a copy of the actual value to a function, while call by reference passes a reference to the actual value.

  • Example: Call by value does ...read more

Add your answer

Q21. write an algorithm to sort using bubble sort .. Write a flow chart to sort an array

Ans.

Algorithm and flow chart for bubble sort on an array

  • Compare adjacent elements and swap if necessary

  • Repeat until no more swaps are needed

  • Time complexity: O(n^2)

  • Space complexity: O(1)

Add your answer

Q22. what is the difference between http and https

Ans.

HTTP is unsecured while HTTPS is secured with SSL/TLS encryption.

  • HTTP stands for Hypertext Transfer Protocol, while HTTPS stands for Hypertext Transfer Protocol Secure.

  • HTTP operates on port 80, while HTTPS operates on port 443.

  • HTTP data is transmitted in plain text, while HTTPS data is encrypted using SSL/TLS.

  • HTTPS provides authentication, integrity, and confidentiality of data exchanged between a client and a server.

  • Websites using HTTPS have a padlock icon in the browser's a...read more

Add your answer

Q23. Difference between declaration and definition

Ans.

Declaration is a statement that tells the compiler about the existence of a variable or function, while definition provides the actual implementation of the variable or function.

  • Declaration introduces a name and its type to the compiler, while definition allocates memory for the variable or function.

  • Declaration does not allocate memory, while definition does.

  • Multiple declarations can exist for a single definition, but only one definition can exist for a single declaration.

  • Exa...read more

Add your answer

Q24. Find employee whose salary is greater than avg salary

Ans.

Query to find employees with salary greater than average salary

  • Calculate the average salary of all employees

  • Retrieve all employees with salary greater than the average salary

  • Use SQL query: SELECT * FROM employees WHERE salary > (SELECT AVG(salary) FROM employees)

Add your answer

Q25. what is indexing

Ans.

Indexing is a technique used to optimize the performance of databases by creating a data structure that allows for quick lookup of data.

  • Indexing involves creating a data structure that maps key values to their corresponding data entries.

  • It helps in speeding up data retrieval operations by reducing the number of disk accesses needed.

  • Examples of indexing include creating indexes on columns in a database table to improve query performance.

Add your answer

Q26. Primary key, Foreign key difference.

Ans.

Primary key uniquely identifies a record, foreign key refers to a field in another table.

  • Primary key is used to ensure uniqueness of a record in a table

  • Foreign key is used to establish a relationship between two tables

  • Primary key cannot be null, foreign key can be null

  • Primary key is used as a reference in foreign key

Add your answer

Q27. technologies learned and implemented

Ans.

I have experience with various technologies including Java, Python, and SQL.

  • Proficient in Java programming language and have implemented it in various projects

  • Experience with Python and its libraries such as NumPy and Pandas for data analysis

  • Familiarity with SQL and database management systems such as MySQL and Oracle

  • Knowledge of web development technologies such as HTML, CSS, and JavaScript

  • Experience with version control systems such as Git and SVN

Add your answer

Q28. Write a flow chart for sorting

Ans.

A flow chart for sorting

  • Start with an unsorted list

  • Compare adjacent elements and swap if necessary

  • Repeat until no more swaps are needed

  • List is now sorted

Add your answer

Q29. What are variables

Ans.

Variables are containers that hold values or references to values in computer programs.

  • Variables are used to store data in a program

  • They can hold different types of data such as numbers, strings, and booleans

  • Variables can be assigned values and their values can be changed throughout the program

  • They are used to make code more readable and reusable

  • Examples of variables include 'age', 'name', and 'isStudent'

Add your answer

Q30. Interest in banking industry

Ans.

I have a strong interest in the banking industry.

  • I have studied finance and economics in college.

  • I have completed internships at banks and financial institutions.

  • I enjoy following the stock market and analyzing financial data.

  • I am excited about the potential for technology to revolutionize banking.

  • I believe that the banking industry plays a crucial role in the global economy.

Add your answer

Q31. difference between lists and tuple in python

Ans.

Lists are mutable, ordered collections of items while tuples are immutable, ordered collections of items in Python.

  • Lists are defined using square brackets [] while tuples are defined using parentheses ().

  • Lists can be modified (add, remove, change elements) while tuples cannot be modified once created.

  • Lists are typically used for collections of similar items while tuples are used for fixed collections of items.

  • Example: list_example = [1, 2, 3] and tuple_example = (4, 5, 6)

Add your answer

Q32. What is use of restful api

Ans.

RESTful API is used to allow communication between different systems over the internet using standard HTTP methods.

  • Allows systems to communicate and exchange data over the internet

  • Uses standard HTTP methods like GET, POST, PUT, DELETE

  • Follows REST architectural principles for designing networked applications

  • Enables stateless communication between client and server

  • Promotes scalability and flexibility in system architecture

Add your answer

Q33. Diff between http and https

Ans.

HTTP is unsecured while HTTPS is secured with SSL/TLS encryption.

  • HTTP stands for Hypertext Transfer Protocol while HTTPS stands for Hypertext Transfer Protocol Secure.

  • HTTP operates on port 80 while HTTPS operates on port 443.

  • HTTP is vulnerable to attacks while HTTPS is secure due to SSL/TLS encryption.

  • HTTPS provides authentication, data integrity, and confidentiality.

  • HTTPS is used for secure online transactions such as online banking, e-commerce, etc.

Add your answer

Q34. What is synchronisation

Ans.

Synchronisation is the coordination of multiple processes or threads to ensure they work together effectively.

  • Synchronisation is important in multi-threaded programming to prevent race conditions and ensure data consistency.

  • Common synchronization mechanisms include locks, semaphores, and barriers.

  • For example, using a mutex lock to protect a shared resource from being accessed by multiple threads simultaneously.

Add your answer

Q35. How to design web application

Ans.

Designing a web application involves planning the user interface, database structure, backend functionality, and security measures.

  • Identify the target audience and their needs

  • Create wireframes and mockups to visualize the layout

  • Choose appropriate technologies for frontend and backend development

  • Implement responsive design for mobile compatibility

  • Secure the application against common vulnerabilities

  • Test the application thoroughly before deployment

Add your answer

Q36. Different type of axxounting entries

Ans.

Different types of accounting entries include journal entries, adjusting entries, reversing entries, and closing entries.

  • Journal entries are used to record transactions in the general ledger.

  • Adjusting entries are made at the end of an accounting period to ensure accurate financial statements.

  • Reversing entries are optional entries made at the beginning of an accounting period to cancel out adjusting entries from the previous period.

  • Closing entries are made at the end of an acc...read more

Add your answer

Q37. What are expection handling in pyhton

Ans.

Exception handling in Python is a way to handle errors that occur during the execution of a program.

  • Use try-except blocks to catch and handle exceptions

  • Different types of exceptions can be handled separately

  • Use finally block to execute code regardless of whether an exception occurred or not

Add your answer

Q38. How do you handle client escalations

Add your answer

Q39. Advantages of REST over SOAP

Ans.

REST is lightweight, scalable, and easier to use compared to SOAP.

  • REST uses standard HTTP methods like GET, POST, PUT, DELETE for communication, making it simpler to implement and understand.

  • REST is stateless, meaning each request from a client to the server must contain all the information necessary to understand the request, making it more scalable.

  • REST allows for multiple data formats like JSON, XML, plain text, while SOAP only supports XML.

  • REST is more flexible and can be...read more

Add your answer

Q40. access specifiers uses and examples

Ans.

Access specifiers control the visibility of class members in object-oriented programming.

  • Public: accessible from any class

  • Private: only accessible within the same class

  • Protected: accessible within the same class and its subclasses

  • Examples: public int age; private String name; protected double salary;

Add your answer

Q41. 2 sum problem to implement in O(n)

Ans.

The Two Sum problem involves finding two numbers in an array that add up to a target value.

  • Iterate through the array and store the difference between the target and current element in a hashmap.

  • Check if the current element exists in the hashmap, if yes, return the indices of the current element and the stored difference.

  • Time complexity of O(n) can be achieved by using a hashmap to store elements and their indices.

Add your answer

Q42. Difference between c and c++

Ans.

C is a procedural programming language while C++ is an object-oriented programming language.

  • C++ supports classes and objects while C does not.

  • C++ has built-in support for polymorphism and inheritance while C does not.

  • C++ has a standard template library (STL) while C does not.

  • C++ allows function overloading while C does not.

  • C++ supports exception handling while C does not.

Add your answer

Q43. quick sort algorithm and code

Ans.

Quick sort is a popular sorting algorithm that uses divide and conquer strategy.

  • Quick sort picks a pivot element and partitions the array around the pivot.

  • It recursively sorts the sub-arrays on either side of the pivot.

  • It is efficient for large datasets but can have worst-case time complexity of O(n^2).

  • Example: [3, 6, 8, 10, 1, 2, 1]

Add your answer

Q44. How load balancers work

Ans.

Load balancers distribute incoming network traffic across multiple servers to ensure no single server is overwhelmed.

  • Load balancers monitor the health of servers and distribute traffic based on predefined algorithms.

  • They can be hardware-based or software-based.

  • Common algorithms used by load balancers include round-robin, least connections, and IP hash.

  • Load balancers can improve reliability and scalability of a website or application.

  • Examples of popular load balancers include ...read more

Add your answer

Q45. What is empty class in Java

Ans.

An empty class in Java is a class that does not have any member variables or methods.

  • An empty class can be defined like this: class EmptyClass {}

  • Empty classes are often used as placeholders or markers in code.

  • Even though an empty class does not have any explicit members, it still inherits from the Object class in Java.

Add your answer

Q46. Research and design ops implementation

Add your answer

Q47. Bugs I found in last project

Ans.

I found and reported 15 critical bugs in the last project, including issues with data validation and UI functionality.

  • Identified 5 bugs related to data validation errors

  • Discovered 7 UI functionality bugs affecting user experience

  • Reported 3 critical bugs impacting system performance

Add your answer

Q48. What is Binary trees,

Ans.

Binary trees are hierarchical data structures composed of nodes, where each node has at most two children.

  • Consists of nodes with at most two children - left and right

  • Each node can have zero, one, or two children

  • Used in data structures like binary search trees and binary heaps

Add your answer

Q49. Framework of test automation

Ans.

Framework of test automation refers to the structure and guidelines for implementing automated testing.

  • Framework provides a set of rules and guidelines for creating and organizing automated tests.

  • It includes tools, libraries, coding standards, and best practices for test automation.

  • Common types of test automation frameworks include data-driven, keyword-driven, and hybrid frameworks.

  • Frameworks help in improving test efficiency, reusability, and maintainability.

  • Examples of popu...read more

Add your answer

Q50. What is SQL injection

Ans.

SQL injection is a type of cyber attack where malicious SQL code is inserted into a vulnerable website's database.

  • Attackers use SQL injection to gain unauthorized access to sensitive data or to modify or delete data in a database.

  • SQL injection can be prevented by using parameterized queries, input validation, and proper error handling.

  • Example: An attacker could use SQL injection to bypass login credentials and gain access to a website's backend database.

  • Example: An attacker c...read more

Add your answer

Q51. Experience in Cmmi

Ans.

I have experience working with CMMI in previous roles.

  • Implemented CMMI Level 3 processes in a software development company

  • Conducted CMMI appraisals and provided recommendations for improvement

  • Trained team members on CMMI processes and best practices

Add your answer

Q52. What is SQLinjection

Ans.

SQL injection is a type of cyber attack where malicious SQL code is inserted into a vulnerable website's database.

  • Allows attackers to access sensitive data

  • Can modify or delete data

  • Can execute commands on the server

  • Can be prevented by input validation and parameterized queries

Add your answer

Q53. Write a SQL quesries

Ans.

SQL query to retrieve employee names and their salaries from a table

  • Use SELECT statement to retrieve data

  • Specify the columns you want to retrieve (employee names and salaries)

  • Specify the table name from which you want to retrieve data

Add your answer

Q54. Joins vs Subqueries

Ans.

Joins are used to combine rows from two or more tables based on a related column, while subqueries are nested queries used to return data for the main query.

  • Joins are used to retrieve data from multiple tables based on a related column.

  • Subqueries are used to return data for the main query by nesting a query within another query.

  • Joins are typically more efficient than subqueries for retrieving data from multiple tables.

  • Example: SELECT * FROM table1 JOIN table2 ON table1.id = t...read more

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at GE Vernova

based on 56 interviews
Interview experience
3.9
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.9
 • 744 Interview Questions
4.0
 • 407 Interview Questions
4.2
 • 330 Interview Questions
3.9
 • 284 Interview Questions
4.2
 • 239 Interview Questions
3.7
 • 155 Interview Questions
View all
Top Temenos Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter