Tietoevry
50+ Kmg Infotech Interview Questions and Answers
Q1. Hashmap hashtabe concurrent hashmap which to use and why in which scenario
ConcurrentHashMap is preferred for thread-safe operations, while HashMap and Hashtable are not.
HashMap is not thread-safe and should not be used in a multi-threaded environment.
Hashtable is thread-safe but has poor performance due to its synchronized nature.
ConcurrentHashMap is thread-safe and has better performance than Hashtable due to its lock-free approach.
Use ConcurrentHashMap when multiple threads are accessing the map concurrently.
Use HashMap when only a single thread ...read more
Q2. Who calls the main method in java
The Java Virtual Machine (JVM) calls the main method in Java.
The main method is the entry point of a Java program.
It is declared as public static void main(String[] args)
The JVM searches for the main method in the class specified in the command line arguments.
If the main method is not found, the JVM throws a NoSuchMethodError.
Q3. 1. What is design pattern and it's types and solid patterns.
Design patterns are reusable solutions to common software design problems. They include creational, structural, and behavioral patterns.
Design patterns are reusable solutions to common software design problems.
They provide proven solutions to recurring design problems.
Design patterns can be categorized into creational, structural, and behavioral patterns.
Creational patterns deal with object creation mechanisms.
Structural patterns focus on class and object composition.
Behavior...read more
Q4. Step to create rest api and rest client
To create a REST API, define endpoints and HTTP methods. To create a REST client, use a library or make HTTP requests.
Define endpoints and HTTP methods for the API
Implement the API using a framework or library
Test the API using tools like Postman
To create a REST client, use a library like Retrofit or make HTTP requests using a library like OkHttp
Parse the response from the API using a library like Gson
Q5. What is Function app? What is App service? What is key vault? Difference between key and secret? Basic questions related to Vm an networking in VM?
Function app is a serverless compute service that enables you to run code on-demand without having to manage infrastructure.
Function app is used to run code on-demand without managing infrastructure
It is a serverless compute service
It supports multiple languages and integrates with other Azure services
Examples of Function app include Azure Functions and Logic Apps
Q6. 1) What is webpack 2) what are the ways to optimize your React application 3) Flex box vs Grid in CSS 4) CSS box model
Answers to technical questions for Senior Software Engineer interview
Webpack is a module bundler for JavaScript applications
Optimizing React app can be done by code splitting, lazy loading, using production build, etc.
Flexbox is for one-dimensional layout while Grid is for two-dimensional layout
CSS box model is a way to represent the layout of HTML elements
Q7. If your System is locked and don't know the password how you recovered?
To recover from a locked system without password, use password reset disk or boot from external media.
Use password reset disk if created beforehand
Boot from external media and reset password
Use command prompt to reset password
Contact IT support for assistance
Q8. Project for final year
Developed a web-based project management system for a construction company.
Used PHP and MySQL for backend development.
Implemented a responsive UI using Bootstrap and jQuery.
Incorporated features such as task assignment, progress tracking, and document management.
Conducted user testing and made improvements based on feedback.
Completed the project within the given timeline and budget.
Q9. Make string palindrome
To make a string palindrome, reverse the string and append it to the original string.
Reverse the input string
Append the reversed string to the original string
Q10. Db queries of mongoDB
MongoDB queries are used to retrieve data from a MongoDB database.
Use find() method to retrieve documents from a collection
Use findOne() method to retrieve a single document
Use sort() method to sort the results
Use limit() method to limit the number of results returned
Q11. .Net fundamental and it's features in detail
The .Net framework is a software development platform developed by Microsoft, providing a wide range of tools and libraries for building various types of applications.
Common Language Runtime (CLR) - manages memory, security, and execution of code
Base Class Library (BCL) - provides a set of reusable classes for common programming tasks
ASP.NET - framework for building web applications
Windows Presentation Foundation (WPF) - for building desktop applications with rich user interf...read more
Q12. SOLID principal in detail
SOLID is a set of five design principles for writing maintainable and scalable object-oriented software.
Single Responsibility Principle (SRP) - A class should have only one reason to change.
Open/Closed Principle (OCP) - Software entities should be open for extension but closed for modification.
Liskov Substitution Principle (LSP) - Objects of a superclass should be replaceable with objects of its subclasses without affecting the program's correctness.
Interface Segregation Prin...read more
Q13. OOPs concept in detail
OOPs (Object-Oriented Programming) is a programming paradigm based on the concept of objects, which can contain data and code.
Encapsulation: Bundling data and methods that operate on the data into a single unit (object)
Inheritance: Ability for a class to inherit properties and behavior from another class
Polymorphism: Ability for objects of different classes to respond to the same message in different ways
Abstraction: Hiding the complex implementation details and showing only ...read more
Q14. What are the OOPS concepts? Explain
OOPS concepts are the fundamental principles of Object-Oriented Programming that help in designing and implementing software.
Encapsulation: Bundling data and methods together in a class to hide the internal details.
Inheritance: Creating new classes from existing classes to reuse code and establish a hierarchical relationship.
Polymorphism: The ability of objects to take on many forms, allowing methods to be overridden and objects to be treated as instances of their parent clas...read more
Q15. What are different loops in coding
Loops are used to execute a set of instructions repeatedly until a certain condition is met.
For loop: executes a block of code a fixed number of times
While loop: executes a block of code as long as the specified condition is true
Do-while loop: executes a block of code at least once, then repeats the loop as long as the specified condition is true
Foreach loop: used to iterate over elements of an array or collection
Nested loops: loops inside another loop
Q16. What is mulesoft any point platform
MuleSoft Anypoint Platform is a unified, flexible integration platform that solves the most challenging connectivity problems.
Anypoint Platform enables organizations to easily build, test, and deploy APIs, integrations, and applications.
It provides a range of tools and services for designing, building, and managing APIs and integrations.
Anypoint Platform includes features such as API management, data integration, and analytics.
It supports a wide range of connectors and protoc...read more
Q17. What are the artifacts used by PM to start the project?
Artifacts used by PM to start a project include project charter, project management plan, stakeholder register, and scope statement.
Project charter: outlines the project objectives, scope, and stakeholders
Project management plan: details the approach, schedule, budget, and resources for the project
Stakeholder register: identifies key stakeholders and their roles in the project
Scope statement: defines the project scope, deliverables, and boundaries
Q18. What are exceptions
Exceptions are unexpected events that occur during the execution of a program and disrupt the normal flow of the program.
Exceptions are used to handle errors and other exceptional conditions in a program.
They can be caught and handled using try-catch blocks.
Examples of exceptions include NullPointerException, ArrayIndexOutOfBoundsException, and IOException.
Q19. MS Outlook configuration at exchange level?
MS Outlook configuration at exchange level involves setting up email accounts, managing permissions, and configuring security settings.
Exchange server must be configured to allow Outlook access
Email accounts must be created and configured with appropriate settings
Permissions must be set for users and groups
Security settings must be configured to prevent unauthorized access
Examples include setting up shared mailboxes, configuring auto-replies, and managing distribution lists
Q20. What is multithreading in java ? Difference between abstract class and interface ? What was my role in my academic project?
Multithreading in Java allows multiple threads to execute concurrently. Abstract class can have both abstract and non-abstract methods, while interface can only have abstract methods.
Multithreading in Java allows for concurrent execution of multiple threads.
Abstract class can have both abstract and non-abstract methods, while interface can only have abstract methods.
In my academic project, my role was to design and implement the user interface for a web application.
Q21. Explain repository pattern
Repository pattern is a design pattern that separates data access logic from business logic in an application.
It helps in achieving separation of concerns by abstracting the data access logic into a separate layer.
It provides a way to centralize data access logic and reuse it across the application.
It typically involves creating interfaces for data access operations and implementing them in concrete classes.
Example: In a web application, the repository pattern can be used to ...read more
Q22. What can you explain about indexing in SQL Server?
Indexing in SQL Server helps improve query performance by allowing faster retrieval of data.
Indexes are data structures that improve the speed of data retrieval operations on a database table.
Clustered indexes determine the physical order of data in a table, while non-clustered indexes create a separate structure.
Indexes can be created on one or more columns in a table to speed up SELECT, UPDATE, DELETE, and MERGE operations.
Using indexes can reduce the number of data pages t...read more
Q23. What types of ETL frameworks are available?
Some types of ETL frameworks include open-source, commercial, cloud-based, and custom-built frameworks.
Open-source ETL frameworks like Apache NiFi, Talend Open Studio
Commercial ETL frameworks like Informatica PowerCenter, IBM InfoSphere DataStage
Cloud-based ETL frameworks like AWS Glue, Google Cloud Dataflow
Custom-built ETL frameworks tailored to specific business needs
Q24. OOP'S concepts, reference vs pointer, malloc() vs new, PL SQL questions, simple snippets output
Questions related to OOP concepts, pointers, memory allocation, PL SQL, and code snippets.
OOP concepts include encapsulation, inheritance, and polymorphism.
Pointers hold memory addresses, while references are aliases for existing variables.
malloc() allocates memory on the heap, while new allocates memory on the heap and constructs an object.
PL SQL is a procedural language used for managing data in Oracle databases.
Code snippets can have varying outputs depending on the input ...read more
Q25. What is any point design center
Any point design center is a software design tool used for creating and editing graphical user interfaces.
APDC is used for designing GUIs for desktop and mobile applications
It allows for easy drag-and-drop of UI elements
APDC supports multiple platforms and programming languages
It offers a variety of templates and themes to choose from
Q26. Background job scheduling steps and Uses
Background job scheduling involves automating the execution of tasks at specific times or intervals.
Background job scheduling helps in automating repetitive tasks, reducing manual effort.
Steps include defining the job, scheduling it, monitoring its execution, and handling any errors.
Uses include data backups, report generation, system maintenance tasks, etc.
Q27. Can we use async without await
Yes, async can be used without await.
Async functions return a promise, which can be handled without using await.
Using async without await can be useful for error handling or logging.
However, it is important to handle the promise returned by the async function.
Q28. Could you provide more specific details about ETL logging?
ETL logging is the process of recording and monitoring the extraction, transformation, and loading of data in a system.
ETL logging helps track the flow of data through the system
It records details such as source data, transformation rules, and destination
Logs can include timestamps, success/failure status, and error messages
ETL logs are essential for troubleshooting, auditing, and performance monitoring
Q29. Explain middleware
Middleware is software that acts as a bridge between different applications or components, allowing them to communicate and share data.
Middleware facilitates communication between different software components
It can handle tasks such as authentication, logging, and data transformation
Examples include message brokers like RabbitMQ, API gateways like Kong, and web servers like Nginx
Q30. Have you worked with Productions Environments?
Yes, I have experience working with Production Environments.
Managed and maintained production servers to ensure uptime and performance
Deployed software updates and patches in production environments
Troubleshooted and resolved issues in live production systems
Q31. What is anypoint runtime fabric
Anypoint Runtime Fabric is a container service that automates the deployment and scaling of Mule runtimes.
It provides a platform for deploying and managing Mule applications across on-premises, cloud, and hybrid environments.
It enables high availability, fault tolerance, and disaster recovery for Mule runtimes.
It supports Kubernetes as the underlying container orchestration platform.
It allows for centralized management and monitoring of Mule applications.
It provides a secure ...read more
Q32. Do you have working experience knowledge on agile?
Yes, I have extensive working experience and knowledge on agile methodologies.
I have worked on multiple agile projects and have experience with Scrum, Kanban, and Lean methodologies.
I have facilitated daily stand-up meetings, sprint planning sessions, and retrospectives.
I have experience in creating and prioritizing product backlogs, user stories, and tasks.
I have worked closely with cross-functional teams to deliver high-quality software products in iterative cycles.
Q33. Why prefer windows over Linux?
Windows is preferred for its user-friendly interface and compatibility with popular software.
Windows has a more intuitive and user-friendly interface compared to Linux.
Many popular software and games are designed to run on Windows.
Windows has better support for hardware drivers.
Windows is more widely used in corporate environments.
Windows offers better compatibility with Microsoft Office suite.
Linux is preferred for its open-source nature and customization options.
Q34. Explain Bubble sort and its program
Bubble sort is a simple sorting algorithm that repeatedly steps through the list, compares adjacent elements and swaps them if they are in the wrong order.
Bubble sort compares adjacent elements in an array and swaps them if they are in the wrong order
It repeats this process until the array is sorted
It has a time complexity of O(n^2)
Example: ['apple', 'banana', 'orange', 'grape'] -> ['apple', 'banana', 'grape', 'orange']
Q35. What is DHCP?
DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that automatically assigns IP addresses to devices on a network.
DHCP is used to simplify network administration by automatically assigning IP addresses to devices on a network.
It allows devices to join a network and obtain an IP address without manual configuration.
DHCP servers can also assign other network configuration information, such as subnet masks and default gateways.
DHCP leases are temporar...read more
Q36. What is cloudhub and maven
CloudHub is a cloud-based integration platform, while Maven is a build automation tool for Java projects.
CloudHub is used for integrating applications and services in the cloud.
It provides a platform for deploying, managing, and scaling integrations.
Maven is used for building and managing Java projects.
It automates the process of building and packaging Java applications.
Maven uses a project object model (POM) to manage dependencies and configurations.
Q37. What is normalization
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization involves breaking down a database into smaller, more manageable tables
Each table should have a primary key and only contain data that is related to that key
Normalization helps to prevent data inconsistencies and anomalies
There are different levels of normalization, with each level building on the previous one
Examples of normalization include converting r...read more
Q38. What is DNN ?
DNN stands for DotNetNuke, a web content management system based on Microsoft .NET.
DNN is a popular CMS used for creating and managing websites.
It is based on Microsoft .NET framework and written in VB.NET or C#.
DNN offers a range of features including content management, user management, and site administration.
It has a large community of developers and users who contribute to its development and support.
Some examples of websites built on DNN include the official website of ...read more
Q39. What are the api error codes?
API error codes are codes that indicate the type of error that occurred during an API request.
API error codes are typically returned in the response body of an API request.
They provide information about the specific error that occurred, helping developers troubleshoot and fix issues.
Common API error codes include 400 Bad Request, 401 Unauthorized, 404 Not Found, and 500 Internal Server Error.
Q40. What is key and explain its type
A key is a unique identifier used to access or retrieve data in a data structure.
A key is used in key-value pairs to uniquely identify the value associated with it.
Keys are commonly used in dictionaries, hash tables, and databases.
Examples of keys include employee IDs, product codes, and usernames.
Q41. How to use ATF in servicenow
ATF (Automated Test Framework) in ServiceNow is used for automated testing of applications and processes.
ATF allows users to create and run automated test cases to validate configurations and processes in ServiceNow.
Test cases can be created using the Test Builder interface or by importing existing test scripts.
ATF provides detailed test results and logs for analysis and troubleshooting.
Test cases can be scheduled to run at specific times or triggered based on events in the s...read more
Q42. Difference between ref and out
Ref and out are both used to pass arguments by reference in C#. Ref is bidirectional while out is unidirectional.
Ref is used to pass a variable by reference and can be read and modified within the method.
Out is used to pass a variable by reference and must be assigned a value within the method.
Ref can be used to pass a variable as an argument to a method and return a value.
Out is used to return multiple values from a method.
Ref is used with initialized variables while out is ...read more
Q43. Tell me about Data structure
Data structure is a way of organizing and storing data in a computer so that it can be accessed and modified efficiently.
Data structures define the way data is organized and stored in memory.
Examples include arrays, linked lists, stacks, queues, trees, and graphs.
Each data structure has its own advantages and disadvantages depending on the type of operations needed.
Q44. What is Business rules
Business rules are automated processes that execute when certain conditions are met in a system.
Business rules are used to enforce policies, streamline processes, and ensure data integrity.
They can be triggered by data changes, user actions, or scheduled events.
Business rules can perform actions like setting field values, sending notifications, or running scripts.
Examples include automatically assigning a priority to a ticket based on certain criteria, or sending an email whe...read more
Q45. Property vs variable
A property is a value associated with an object, while a variable is a named storage location for a value.
Properties are accessed using dot notation or bracket notation
Variables are declared using keywords like var, let, or const
Properties are defined within an object literal or added to an object dynamically
Variables can be reassigned to different values
Example: object.property vs var variableName
Q46. what is flow reference ?
Flow reference is a component in MuleSoft that allows reusing a flow in multiple places within an application.
Flow reference is used to call a flow from another flow.
It helps in modularizing the application by breaking down complex flows into smaller reusable components.
Flow reference can pass parameters to the called flow and receive output back from it.
It improves code reusability and maintainability in MuleSoft applications.
Q47. Do you know about STLC?
STLC stands for Software Testing Life Cycle, which is a systematic approach to testing software.
STLC involves different phases such as requirement analysis, test planning, test design, test execution, and test closure.
Each phase has its own set of activities and deliverables.
STLC ensures that the software is thoroughly tested and meets the quality standards before release.
Q48. How do you automate SDLC?
Automating SDLC involves using tools and scripts to streamline and optimize the software development process.
Use continuous integration and continuous deployment (CI/CD) tools to automate build, test, and deployment processes.
Implement configuration management tools to automate infrastructure provisioning and management.
Utilize automation scripts for repetitive tasks such as code reviews, testing, and deployment.
Integrate automated testing tools to ensure code quality and red...read more
Q49. what is your expected CTC
My expected CTC is negotiable based on the responsibilities and benefits offered by the company.
My expected CTC is based on my experience, skills, and the market rate for Senior Project Managers.
I am open to discussing the salary range during the interview process.
I am looking for a competitive salary package that reflects my expertise and contributions to the role.
Q50. What is workflow ?
Workflow is a series of tasks that are completed in a specific order to achieve a desired outcome.
Workflow is a sequence of steps or activities that automate a business process.
It helps in streamlining and optimizing processes by defining the tasks, their sequence, and conditions for each task.
Workflows can be simple or complex, involving multiple stakeholders and systems.
Examples include employee onboarding process, IT service request approval process, and incident managemen...read more
Q51. Patch management process
Patch management process involves the systematic application of patches to software systems to address vulnerabilities and improve security.
Patch management is a critical aspect of maintaining the security and stability of software systems.
It involves identifying vulnerabilities and applying patches to address them.
The process typically includes steps such as vulnerability assessment, patch testing, deployment, and monitoring.
Regular patch management helps protect against cyb...read more
Q52. reverse string and optimize it
Reverse array of strings efficiently
Use two pointers approach to swap characters from start and end of each string
Optimize by using in-place reversal instead of creating new strings
Consider edge cases like empty strings or strings with only one character
Q53. What are testing techniques
Testing techniques are methods used to verify and validate software applications to ensure they meet requirements and function correctly.
Black box testing: Testing the functionality of a software application without knowledge of its internal code.
White box testing: Testing the internal logic and structure of a software application.
Regression testing: Re-running tests on previously tested software to ensure that new changes have not affected existing functionality.
Smoke testin...read more
Q54. Explain OPPS concept in c++
OPPS is a programming paradigm that focuses on objects and their interactions to solve problems.
OPPS stands for Object-Oriented Programming System
It involves the use of classes, objects, inheritance, polymorphism, and encapsulation
C++ is an object-oriented programming language that supports OPPS
Example: A car can be represented as an object with properties like color, model, and methods like start, stop, and accelerate
Q55. Write a dbms query i.
A dbms query i was asked to write for Engineer Trainee position.
Specify the table name and columns to be selected
Use WHERE clause to filter the data
Use JOIN to combine data from multiple tables
Use GROUP BY to group data based on a column
Use ORDER BY to sort the data in ascending or descending order
Q56. What is the opps
Object-oriented programming (OOP) is a programming paradigm based on the concept of objects, which can contain data in the form of fields (attributes) and code in the form of procedures (methods).
OOP focuses on creating reusable code by organizing data and behavior into objects.
Key principles of OOP include encapsulation, inheritance, and polymorphism.
Examples of OOP languages include Java, C++, and Python.
Q57. SAP GRC implementation Process
SAP GRC implementation involves planning, design, configuration, testing, and deployment of SAP Governance, Risk, and Compliance solutions.
Understand business requirements and objectives
Design GRC framework and controls
Configure GRC system based on requirements
Test system functionality and security controls
Train end-users and stakeholders
Deploy GRC solution and monitor performance
Q58. USOBT_C VS USOBX_C
USOBT_C and USOBX_C are tables in SAP used for authorization checks.
USOBT_C stores authorization object definitions
USOBX_C stores authorization field values
USOBT_C is used to define authorization objects and their fields
USOBX_C is used to assign values to authorization fields for specific objects
More about working at Tietoevry
Top HR Questions asked in Kmg Infotech
Interview Process at Kmg Infotech
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month