UST
10+ PharmEasy Interview Questions and Answers
Q1. How to use design phase in software development?
Design phase is crucial in software development to plan and visualize the system architecture and functionality.
Identify the requirements and constraints
Create a high-level design and break it down into smaller components
Choose appropriate technologies and tools
Consider scalability, maintainability, and security
Iterate and refine the design based on feedback
Examples: UML diagrams, flowcharts, wireframes
Q2. Can you explain what is I in SOLID design principles
I stands for Interface Segregation Principle in SOLID design principles.
Interface Segregation Principle states that a client should not be forced to depend on methods it does not use.
It promotes the use of smaller, cohesive interfaces instead of large, monolithic ones.
This helps in reducing the coupling between different components of the system.
For example, if a class needs only a subset of methods from an interface, it should not be forced to implement all the methods.
Inste...read more
Q3. How to it can help in software development?
Collaboration tools can help in software development by improving communication, increasing productivity, and facilitating project management.
Collaboration tools like Slack, Trello, and Jira can improve communication between team members and stakeholders.
Version control systems like Git can help manage code changes and facilitate collaboration among developers.
Project management tools like Asana and Basecamp can help teams stay organized and on track.
Code review tools like Gi...read more
Q4. How can you get 5th row from a PS file through JCL
Use JCL to extract 5th row from a PS file
Use the SORT utility in JCL to extract the 5th row from the PS file
Specify the starting position and length of the record in the SORT statement
Use the OUTFIL statement to write the extracted row to an output file
Q5. Authentication and authorisation mechanism used in the application
The application uses OAuth 2.0 for authentication and role-based access control for authorisation.
OAuth 2.0 is an industry-standard protocol for authorisation and authentication.
Role-based access control restricts access based on the user's role.
Examples of roles include admin, user, and guest.
OAuth 2.0 allows users to grant access to their resources without sharing their credentials.
The application may also use multi-factor authentication for added security.
Q6. difference between machine learning and deep learning
Machine learning is a subset of AI that focuses on developing algorithms to make predictions based on data, while deep learning is a subset of machine learning that uses neural networks to learn from data.
Machine learning is a broader concept that involves algorithms that can learn from and make predictions or decisions based on data.
Deep learning is a subset of machine learning that uses neural networks with multiple layers to learn from data.
Deep learning requires a large a...read more
Q7. What is your view on AI in IT industry
AI is revolutionizing the IT industry by automating tasks, improving efficiency, and enabling new capabilities.
AI is being used for automating repetitive tasks, such as data entry and testing.
AI is improving efficiency by analyzing large amounts of data quickly and accurately.
AI is enabling new capabilities, such as natural language processing and image recognition.
AI is being integrated into various IT systems, such as chatbots for customer support and predictive analytics f...read more
Q8. Do you have any experience on C++/C/C#
Yes, I have experience in C++, C, and C# programming languages.
I have worked on various projects using C++, C, and C# languages.
I am proficient in writing code, debugging, and optimizing performance in these languages.
I have experience in developing applications, software tools, and systems using C++, C, and C#.
I am familiar with object-oriented programming concepts and design patterns in these languages.
Q9. How spark lauches job on Yarn
Spark launches job on Yarn by creating an application master and containers for executors.
Spark submits a job to Yarn ResourceManager
Yarn launches an ApplicationMaster on a NodeManager
ApplicationMaster requests containers for executors from ResourceManager
Containers are launched on NodeManagers
Executors run tasks on data partitions
Results are returned to the driver program
Q10. how to communicate between components
Communication between components is achieved through various methods like props, events, and state management.
Use props to pass data from parent to child components
Use events to trigger actions in one component from another
Use state management libraries like Redux or Vuex for global state management
Q11. What is mapreduce in Hadoop
MapReduce is a programming model used to process large datasets in parallel on a Hadoop cluster.
MapReduce breaks down the input data into smaller chunks and processes them in parallel.
It consists of two phases: Map phase and Reduce phase.
Map phase processes the input data and produces intermediate key-value pairs.
Reduce phase takes the output of Map phase and combines the values with the same key.
Examples of MapReduce applications include word count, log analysis, and recomme...read more
Q12. what is generative ai
Generative AI is a type of artificial intelligence that is capable of creating new content, such as images, text, or music, based on patterns and examples it has been trained on.
Generative AI uses neural networks to generate new content based on patterns in existing data.
Examples of generative AI include DeepDream, which creates surreal images, and GPT-3, a language model that can generate human-like text.
Generative AI can be used in various fields such as art, music, and wri...read more
Q13. extract numbers from the string
Use regular expressions to extract numbers from a string.
Use regex pattern '\d+' to match one or more digits in the string.
Use a loop to iterate through the matches and store them in an array.
Consider using a library like 're' in Python for easier implementation.
Q14. Session management techniques
Session management techniques are used to maintain user sessions and prevent unauthorized access.
Session IDs and cookies are commonly used to manage sessions.
Session timeouts can be set to automatically log out inactive users.
Secure session management practices should be followed to prevent session hijacking.
Session data should be encrypted and stored securely.
Regular session audits should be conducted to identify and address vulnerabilities.
Q15. What is angular
Angular is a popular open-source web application framework developed by Google.
Angular is used for building dynamic web applications.
It follows the MVC (Model-View-Controller) architecture.
Angular provides features like data binding, dependency injection, and routing.
Angular CLI (Command Line Interface) is used for creating and managing Angular projects.
Q16. Explain Agile Framework
Agile Framework is a project management approach that emphasizes flexibility, collaboration, and incremental progress.
Agile involves breaking down projects into smaller tasks and completing them in short iterations called sprints.
It prioritizes customer feedback and collaboration between cross-functional teams.
Common Agile frameworks include Scrum, Kanban, and Extreme Programming (XP).
More about working at UST
Interview Process at PharmEasy
Top Software Developer Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month