Virtusa Consulting Services
300+ Airblack Interview Questions and Answers
Reverse a given stack of integers using recursion.
Note:
You are not allowed to use any extra space other than the internal stack space used due to recursion. You are not allowed to...read more
You are given a string S of words. Your task is to count the occurrence of each word present in the string S. A word is a sequence of one or more non-space characters, and there can be mu...read more
You are given a positive number ‘N.’ You need to find all the numbers such that the sum of digits of those numbers to the number itself is equal to ‘N.’
For example:
You are given ‘N’ as 21, th...read more
Given a singly linked list of integers. Your task is to return the head of the reversed linked list.
For example:
The given linked list is 1 -> 2 -> 3 -> 4-> NULL. Then the reverse linked lis...read more
Given an array/list 'ARR' of ‘N’ distinct integers, you are supposed to find the third largest element in the given array 'ARR'.
Input Format :
The first line contains a single integer ‘T’...read more
Pre-requisites: Anagrams are defined as words or names that can be formed by rearranging letters of another word. Such as "spar" can be formed by rearranging letters of "rasp". Hence, "spar" and "r...read more
Implement a queue data structure which follows FIFO(First In First Out) property, using only the instances of the stack data structure.
Note:
1. To implement means you need to complete some pre...read more
You are given an input string 'S'. Your task is to find and return all possible permutations of the input string.
Note:
1. The input string may contain the same characters, so there w...read more
You are given a starting position for a rat which is stuck in a maze at an initial point (0, 0) (the maze can be thought of as a 2-dimensional plane). The maze would be given in the form of a squar...read more
You have been given an array 'ARR' of 'N' distinct elements.
Your task is to find the minimum no. of swaps required to sort the array.
For example:
For the given...read more
Q11. Guesstimate on how many flights on a day in Delhi airport
Approximately 1,200 flights per day operate from Delhi airport.
Delhi airport is one of the busiest airports in India
It operates both domestic and international flights
On average, there are around 50 flights per hour
The number of flights may vary depending on the season and day of the week
Q12. 1.What is constraints and it's types? 2.what is meant by wrapper class? 3.What is meant by string buffer? 4.Write a program to print number of count of characters in a string and remove duplicates by giving use...
read moreThis interview includes questions related to constraints, wrapper class, string buffer, and programming.
Constraints are rules that limit the values or types of data that can be entered into a field or table. There are two types of constraints: column-level and table-level constraints.
Wrapper classes are classes that encapsulate primitive data types and provide methods to manipulate them. For example, Integer is a wrapper class for the int primitive data type.
StringBuffer is a...read more
Basic concepts of java.
What is Constructor,
what is Oops concept,
What is exceptional handling,
What is multithreading,
how to reverse a linkedlist,
What was your college project,
What is di...read more
You are given an ‘M*N’ Matrix, You need to print all possible paths from its top left corner to the bottom right corner if giv...read more
Q15. Unix: 1)How we simply find files in directory 2)count of word by using grep command 3)how we kill the particular process 4)command for findout kernal version and on which operating system we worked on 5)what is...
read moreTechnical interview questions on Unix and SQL
To find files in a directory, use the 'find' command
To count words using grep, use the '-c' option
To kill a particular process, use the 'kill' command with the process ID
To find the kernel version and operating system, use the 'uname' command
The 'top' command is used to monitor system processes and resource usage
A zombie process is a process that has completed execution but still has an entry in the process table
Joins in SQL are us...read more
What are the three levels of data abstraction?
Q17. Coding question: 1. remove sub string and sort alphabetically 2. reverse of a given string 3. bubble sort
Coding questions on string manipulation and sorting algorithms.
For removing a substring and sorting alphabetically, use string manipulation and sorting functions.
To reverse a string, use a loop to iterate through the string and append each character to a new string in reverse order.
For bubble sort, use nested loops to compare adjacent elements and swap them if they are in the wrong order.
Q18. From JAVA:- what is interface? What is collection in java? What is jdk, jre, and jvm? The interviewer wrote some code snippets in chat window and asked me for the output.
Q19. 1) project flow which I worked in previous organization 2)which linux operating system used 3)what is the application server in your project 4)what is the webserver 5)how you login to your application 6)what ki...
read moreQuestions related to project flow, Linux OS, application and web server, troubleshooting, ticketing tool, and handling critical situations.
Worked on Agile methodology with JIRA as ticketing tool
Used Ubuntu as the Linux operating system
Tomcat was the application server and Apache was the web server
Logged in to the application using LDAP authentication
Performed troubleshooting by analyzing logs and using debugging tools
Handled critical situations by following the incident manag...read more
Q20. Types of file in synon, types of context of fields in functions, types of fields in synon, types of screen in synon and difference, purpose of arrays in synon, how to delete single and all records in arrays in ...
read moreSynon file types, field contexts, screen types, array purpose and deletion in Synon
Synon file types include physical, logical, and display files
Field contexts in functions include input, output, and both
Types of fields in Synon include alphanumeric, numeric, and date
Types of screens in Synon include inquiry, maintenance, and report
Arrays in Synon are used to store multiple values of the same data type
To delete a single record in an array, use the DELETE_ARRAY_ENTRY function
To...read more
What is the difference between JDK, JRE, and JVM?
What are some of the advantages of HTML5 over its previous versions?
What are the various formatting tags in HTML?
Q24. Data Structure:- What is linked list and queue? What is Stack and Heap?
What is Cursor? How to use a Cursor?
What is meant by normalization and denormalization?
Difference between reset vs normalize CSS?. How do they differ?
What is the difference between SQL and NoSQL databases?
Write the code for the both semaphore oprations.
What is the difference between .call() and .apply()?
One use case was given as Account Statements Transcription to be done as a full stack application to convert the uploading excell sheet document into sql table and fetch it as per user needs in the UI...read more
How would you differentiate between a String, StringBuffer, and a StringBuilder?
How do you compare Object and Map
How you setup the architecture in azure when client is moving to cloud from on-prem?
Q34. OOPS:-define OOPS? What are the features of OOPS? What are the types of inheritance? What is method overloading and overriding?
What are the use cases of Kafka monitoring?
What are the major differences between RequestMapping and GetMapping?
What is a z-index, how does it function?
What are the four core API architectures that Kafka uses?
What Are the Basic Annotations that Spring Boot Offers?
Q40. How many stages will be created if a spark job has 3 wide transformations and 2 narrow transformations?
There will be 4 stages created in total for the spark job.
Wide transformations trigger a shuffle and create a new stage.
Narrow transformations do not trigger a shuffle and do not create a new stage.
In this case, 3 wide transformations will create 3 new stages and 2 narrow transformations will not create new stages.
Therefore, a total of 4 stages will be created.
What is the difference between let and var
What is the root application context in Spring MVC? How is it loaded?
Q43. If more than 50K records are fetched by the SOQL in the trigger. how to handle that.
To handle more than 50K records fetched by SOQL in trigger, use batch apex or pagination.
Use batch apex to process records in smaller chunks
Implement pagination to limit the number of records fetched at a time
Consider using selective SOQL queries to reduce the number of records fetched
Avoid using SOQL queries inside loops
Use query optimizer tool to optimize SOQL queries
Q45. sql command for inserting details in table,changing them and deleting specifics ones
SQL commands for inserting, updating, and deleting data from a table.
INSERT INTO table_name (column1, column2, column3) VALUES (value1, value2, value3);
UPDATE table_name SET column1 = new_value1 WHERE condition;
DELETE FROM table_name WHERE condition;
Difference between Abstract class and Interface.
How does Spring Boot works?
Q48. sql command for creating a table
SQL command for creating a table
Use CREATE TABLE statement
Specify table name and column names with data types
Add any constraints or indexes as needed
Introduction , Projects and technologies worked on , sql queries like select , insert , difference between delete , truncate, drop , synchronized & asynchronized programming , oops properties...read more
What is dependency Injection?
How do you create an immutable class in hibernate?
Q52. Explain How was your syllobus was done in Lockdown at College?
During lockdown, my college syllabus was completed through online classes and self-study.
Online classes were conducted through video conferencing platforms like Zoom or Google Meet.
Assignments and exams were taken online using tools like Google Classroom or Moodle.
Self-study involved reading textbooks, watching online tutorials, and practicing coding exercises.
Regular communication with professors and classmates through emails or discussion forums.
Adapted to the new learning ...read more
Q53. Can you write code for printing a star in java
Yes, I can write code for printing a star in Java.
Create an array of strings to represent the star
Use a loop to iterate through each row of the array
Use another loop to iterate through each column of the array
Print the value at each row and column position
Example: String[] star = {" * ", " *** ", "*****", " *** ", " * "};
Example: for (String row : star) { System.out.println(row); }
Explain the use of final keyword in variable, method and class.
What is hibernate caching?
Q56. From DBMS:- What is joins? What are the types of join? He wrote a table on the chat window and asked me to find the left outer join.
How you deploy multiple environment script using terraform
Q58. If you have 20 to 40 range, what testing technique will you use?
I would use boundary value analysis testing technique.
Boundary value analysis involves testing the boundaries of valid and invalid input ranges.
It helps in identifying any issues that may occur at the boundaries of the input range.
Examples include testing a function with inputs just below, at, and just above the specified range limits.
Explain @RestController annotation in Sprint boot?
Q60. write trigger , there are 3 objects, a is parent, b child, c is grand child, when grand child updated update grand child desc on a object desc
Write a trigger to update the description field on the parent object when the grandchild object is updated.
Create a trigger on the grandchild object
Use a SOQL query to retrieve the parent object
Update the description field on the parent object with the grandchild's description
Q61. Difference between partial and render partial in MVC?
Partial is used to render a specific portion of a view, while render partial is used to render a partial view within another view in MVC.
Partial is used to render a specific portion of a view in MVC.
Render partial is used to render a partial view within another view in MVC.
Partial can be used to render a reusable piece of code in multiple views.
Render partial is useful for rendering common elements like headers or footers in multiple views.
Example: <%= render partial: 'header...read more
Q62. Steps in recognition revenue, Revenue entries, Month end closures
Steps in revenue recognition, revenue entries, and month-end closures for Financial Accountant role.
Revenue recognition involves identifying the transaction, determining the amount of revenue to be recognized, and allocating the revenue to the appropriate period.
Revenue entries are recorded in the general ledger and include debiting accounts receivable and crediting revenue accounts.
Month-end closures involve reconciling revenue accounts, preparing financial statements, and c...read more
Q63. What is error,bug lifecycle,regression,stlc,entry and exit poitns for bug, then scenario based questions
Answering questions related to error, bug lifecycle, regression, STLC, entry and exit points for bug, and scenario-based questions.
Error is a deviation from the expected result, while a bug is a coding error that causes an error.
Bug lifecycle includes identification, reporting, prioritization, fixing, retesting, and closure.
Regression testing is performed to ensure that changes made to the software do not introduce new bugs.
STLC (Software Testing Life Cycle) includes planning...read more
Q64. Best practices, Issues faced and how they were mitigated
Best practices, issues faced, and their mitigation in the role of Lead Consultant
Implementing regular communication channels to ensure effective collaboration among team members
Establishing clear project goals and objectives to guide the team's efforts
Identifying and addressing potential risks and challenges proactively
Leveraging industry best practices and lessons learned from previous projects
Encouraging continuous learning and professional development within the team
Buildi...read more
Q65. what is access specifiers define access specifers
Access specifiers define the level of access to classes, methods, and variables in object-oriented programming.
Access specifiers include public, private, protected, and default.
Public access specifier allows access from any other class.
Private access specifier restricts access to only within the same class.
Protected access specifier allows access within the same package and subclasses.
Default access specifier (no keyword) restricts access to only within the same package.
Q66. Deferred Revenue how you recognize the same
Deferred revenue is recognized when the performance obligation is satisfied.
Deferred revenue is recognized when the performance obligation is satisfied.
It is recognized as revenue in the income statement.
It is initially recorded as a liability on the balance sheet.
Deferred revenue arises when a company receives payment for goods or services that have not yet been provided.
Examples include subscription services, prepaid rent, and gift cards.
Q67. What init used in python Sudo program on ascending order of list items as given
The init used in Python is __init__ which is a constructor method for initializing objects.
The __init__ method is called automatically when an object is created.
It takes self as the first parameter and can take additional parameters for initialization.
Example: class Car: def __init__(self, make, model): self.make = make self.model = model
In the above example, the __init__ method initializes the make and model attributes of the Car object.
Q68. How do you approach performance tuning of a stored procedure?
I approach performance tuning of a stored procedure by analyzing query execution plans, optimizing indexes, and rewriting inefficient code.
Analyze query execution plans to identify bottlenecks
Optimize indexes to improve data retrieval speed
Rewrite inefficient code to reduce unnecessary processing
Consider parameter sniffing and data distribution for optimal performance
Create 2 tables and perform different operations.
Q70. How do you manage stakeholders or business? How do you gather requirements?
I manage stakeholders by building relationships and understanding their needs. I gather requirements through active listening and documentation.
Identify key stakeholders and their needs
Build relationships and establish trust
Actively listen to their requirements and concerns
Document requirements and communicate changes
Manage expectations and provide regular updates
Use tools such as surveys, interviews, and workshops to gather requirements
Ensure requirements are aligned with bu...read more
Q71. 2)what is the difference between remove and delete?
Q72. How can design thinking be used in making a digital product?
Design thinking can be used in making a digital product by focusing on user needs, prototyping, and iterating based on feedback.
Start by empathizing with the users to understand their needs and pain points
Define the problem statement and ideate potential solutions
Create prototypes to test and gather feedback from users
Iterate on the design based on feedback to improve user experience
Collaborate with cross-functional teams to ensure the product meets both user and business goa...read more
Q73. Can you emphasize more about your advanced MS Excel using dashboards?
I have extensive experience creating advanced MS Excel dashboards using various functions and features.
I have created dynamic dashboards using pivot tables, slicers, and conditional formatting.
I am proficient in using advanced functions such as VLOOKUP, INDEX-MATCH, and SUMIFS to extract and analyze data.
I have experience in creating interactive charts and graphs to visualize data trends and insights.
I have developed automated reports using macros and VBA to streamline data p...read more
Q74. What do you know about Spark architecture?
Spark architecture is based on a master-slave architecture with a cluster manager to coordinate tasks.
Spark architecture consists of a driver program that communicates with a cluster manager to coordinate tasks.
The cluster manager allocates resources and schedules tasks on worker nodes.
Worker nodes execute the tasks and return results to the driver program.
Spark supports various cluster managers like YARN, Mesos, and standalone mode.
Spark applications can run in standalone mo...read more
Q75. what performance metrics are used in Machine Learning?
Performance metrics in Machine Learning measure the effectiveness and efficiency of models.
Accuracy: measures the proportion of correct predictions out of the total predictions made by the model.
Precision: measures the proportion of true positive predictions out of all positive predictions made by the model.
Recall: measures the proportion of true positive predictions out of all actual positive instances in the dataset.
F1 Score: a combination of precision and recall, providing...read more
Q76. Which in most efficient sorting algorithm amd why and what is it's time complexity.
The most efficient sorting algorithm is Quick Sort due to its average time complexity of O(n log n).
Quick Sort is efficient due to its divide and conquer approach.
It has an average time complexity of O(n log n) and a worst-case time complexity of O(n^2).
Example: Sorting an array of integers using Quick Sort.
Q77. how manual sharing works and how to see manually shared rercords
Manual sharing allows users to manually grant access to records. To see manually shared records, use the 'Sharing' button on the record detail page.
Manual sharing is a feature in Salesforce that allows users to manually grant access to records.
It is useful when users need to share specific records with other users or groups.
To manually share a record, users can click on the 'Sharing' button on the record detail page.
From there, they can add individual users or groups and spec...read more
Q78. what are oops concept what is encapsulation what is dbms
OOPs concepts are principles in object-oriented programming, encapsulation is the bundling of data and methods within a class, and DBMS stands for Database Management System.
OOPs concepts include inheritance, polymorphism, encapsulation, and abstraction
Encapsulation is the concept of bundling data and methods that operate on the data within a single unit, such as a class
DBMS is a software system that manages databases, allowing users to interact with the data stored in them
Ex...read more
Q79. what are closures and higher order components,life cycle methods etc
Closures are functions that have access to their own scope, higher order components are functions that take other functions as arguments, and life cycle methods are methods that are called at certain points in a component's life cycle.
Closures are functions that can access variables from their outer scope even after the outer function has finished executing.
Higher order components are functions that take other components as arguments and return a new component.
Life cycle meth...read more
Q80. Diff between function and stored procedure Define abstraction and encapsulation Oops concepts in detail
A function is a block of code that performs a specific task, while a stored procedure is a named group of SQL statements.
Functions are used to return a single value, while stored procedures can return multiple values.
Functions can be called from within SQL statements, while stored procedures are called using their name.
Functions are typically used for calculations or data manipulation, while stored procedures are used for complex tasks or business logic.
Functions are defined ...read more
Q81. Is a string mutable/immutable with an example
A string can be both mutable and immutable depending on the programming language.
In languages like Java and Python, strings are immutable.
In languages like C++ and C#, strings are mutable.
Immutable strings cannot be modified once created, while mutable strings can be modified.
Example of immutable string: 'hello world'.replace('o', '0') returns 'hell0 w0rld'.
Example of mutable string: string s = 'hello'; s[0] = 'j'; s now becomes 'jello'.
Q82. When to use GET, POST, PUT, DELETE (Rest methods)
GET for retrieving data, POST for creating data, PUT for updating data, DELETE for deleting data
GET: Used to retrieve data from a server
POST: Used to create new data on a server
PUT: Used to update existing data on a server
DELETE: Used to delete data on a server
Example: GET request to fetch user information, POST request to create a new user, PUT request to update user details, DELETE request to delete a user
Q83. difference between truncate and drop
Truncate and drop are SQL commands used to remove data from a table.
Truncate removes all data from a table but keeps the structure intact.
Drop removes the entire table and its structure.
Truncate is faster than drop as it only removes data.
Drop cannot be undone while truncate can be rolled back.
Truncate resets the identity of the table while drop does not.
Examples: TRUNCATE TABLE table_name; DROP TABLE table_name;
Q84. How to use current page's Id in LWC
To use current page Id in LWC, we can import '@salesforce/apex' and call Apex method to get the Id.
Import '@salesforce/apex' in LWC JS file
Create an Apex method to return current page Id
Call the Apex method in LWC JS file using '@wire'
Access the current page Id in LWC HTML file using '{pageId}'
Q85. How does cyber ark tool manage password management for privilege functional Ids
CyberArk tool manages password management for privilege functional Ids by securely storing, rotating, and controlling access to credentials.
CyberArk stores privileged account credentials in a secure vault
It automatically rotates passwords to reduce the risk of unauthorized access
Access to passwords is controlled through policies and workflows
It provides auditing and reporting capabilities for privileged account usage
Integration with Active Directory and other systems for seam...read more
Q86. How do you onboard static privilege accounts in to cyber ark to automate the password management
Static privilege accounts can be onboarded into CyberArk for automated password management by following these steps.
Identify the static privilege accounts that need to be onboarded into CyberArk.
Create a Safe in CyberArk to store the passwords for these accounts.
Define the policies and permissions for accessing and managing these accounts within CyberArk.
Use CyberArk's REST API or CLI to automate the onboarding process by importing the account details and setting up password ...read more
Q87. how to convert vb to fb
VB to FB conversion involves rewriting Visual Basic code into Facebook's programming language.
Identify the functionality and logic of the VB code
Rewrite the code using Facebook's programming language syntax
Test the converted code to ensure it functions correctly
Q88. what is the adb devices command and when we are use it
adb devices command is used to list all Android devices connected to a computer via USB debugging
Used to check the list of Android devices connected to the computer for debugging purposes
Helps in identifying the device ID and status (offline, online, unauthorized)
Commonly used in Android development for testing and debugging
Example: 'adb devices' command will display a list of connected devices with their respective status
Q89. What are dependency we added in POM.xml file for mobile automation
We added dependencies like Appium, TestNG, Selenium, and Apache POI in POM.xml for mobile automation.
Appium dependency for mobile automation testing
TestNG dependency for test execution and reporting
Selenium dependency for web automation
Apache POI dependency for reading and writing Excel files
Q90. What is PySpark, and can you explain its features and uses?
PySpark is a Python API for Apache Spark, used for big data processing and analytics.
PySpark is a Python API for Apache Spark, a fast and general-purpose cluster computing system.
It allows for easy integration with Python libraries and provides high-level APIs in Python.
PySpark can be used for processing large datasets, machine learning, real-time data streaming, and more.
It supports various data sources such as HDFS, Apache Hive, JSON, Parquet, and more.
PySpark is widely use...read more
Q91. What are object oriented programming language and all..?
Object-oriented programming languages are based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.
Objects are instances of classes, which define the structure and behavior of the objects.
Encapsulation is a key feature, where data is hidden within objects and can only be accessed through methods.
Inheritance allows classes to inherit attributes and methods from other classes.
Polymorphism enables objects to be treated as i...read more
Q92. Different between if loop and while loop Types of pointers
If loop is used for conditional execution while while loop is used for repetitive execution.
If loop executes the code block only if the condition is true, while loop executes the code block repeatedly until the condition becomes false.
If loop is used when the number of iterations is known, while loop is used when the number of iterations is unknown.
Example of if loop: if(x > 0) { //code block }
Example of while loop: while(x > 0) { //code block }
Q93. How can that data be leveraged against competitors?
Data can be leveraged against competitors by identifying trends, making informed decisions, and improving strategies.
Analyzing customer behavior to identify preferences and trends
Utilizing market research data to make informed decisions on pricing and product offerings
Benchmarking performance metrics against competitors to identify areas for improvement
Implementing data-driven strategies to stay ahead of competitors
Leveraging data analytics tools to gain insights and make str...read more
Q94. Tell us what you can see on the drawing, identify anything
The drawing shows a mechanical assembly with various components and dimensions.
Identify different parts such as gears, shafts, bearings, etc.
Note any dimensions or tolerances specified on the drawing.
Check for any annotations or symbols indicating specific features or requirements.
Q95. coding question to remove duplicate , count frequencies of occurrence of characters
Remove duplicates and count frequencies of characters in an array of strings.
Iterate through each string in the array
Use a hashmap to store characters and their frequencies
Remove duplicates by checking if character already exists in hashmap
Q96. How to improve test coverage of a class.
To improve test coverage of a class, write more test cases to cover all possible scenarios.
Identify uncovered lines of code using a code coverage tool
Write test cases for each uncovered line of code
Write test cases for boundary conditions and edge cases
Use mock objects to simulate dependencies
Refactor code to make it more testable
Q97. What is difference between union and union all
UNION combines the result sets of two or more SELECT statements, while UNION ALL does the same but includes duplicate rows.
UNION removes duplicate rows from the result set, while UNION ALL includes all rows
UNION is slower than UNION ALL because it has to perform a distinct operation
UNION requires that all SELECT statements have the same number of columns with compatible data types
Q98. How to access the api deployed behind the vpc
To access the API deployed behind the VPC, you can set up a VPN connection or use a bastion host.
Set up a VPN connection to the VPC to securely access the API
Use a bastion host as a jump server to access the API
Ensure proper security group and network ACL configurations to allow access to the API from specific IP addresses
Q99. What are the Linux command you use in daily routines
I use commands like ls, cd, grep, and chmod in my daily routines on Linux.
ls - list directory contents
cd - change directory
grep - search for specific patterns in files
chmod - change file permissions
More about working at Virtusa Consulting Services
Top HR Questions asked in Airblack
Interview Process at Airblack
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month