Virtusa Consulting Services
300+ Sinnonteq IT Consulting Interview Questions and Answers
Q1. Reverse Stack with Recursion
Reverse a given stack of integers using recursion. You must accomplish this without utilizing extra space beyond the internal stack space used by recursion. Additionally, you must r...read more
Q2. Word Occurrence Counting
Given a string 'S' of words, the goal is to determine the frequency of each word in the string. Consider a word as a sequence of one or more non-space characters. The string can have mu...read more
Number and Digits Problem Statement
You are provided with a positive integer N
. Your task is to identify all numbers such that the sum of the number and its digits equals N
.
Example:
Input:
N = 21
Output:
[15]
Q4. Reverse Linked List Problem Statement
Given a singly linked list of integers, return the head of the reversed linked list.
Example:
Initial linked list: 1 -> 2 -> 3 -> 4 -> NULL
Reversed linked list: 4 -> 3 -> 2...read more
Q5. Find the Third Greatest Element
Given an array 'ARR' of 'N' distinct integers, determine the third largest element in the array.
Input:
The first line contains a single integer 'T' representing the number of te...read more
Q6. Anagram Pairs Verification Problem
Your task is to determine if two given strings are anagrams of each other. Two strings are considered anagrams if you can rearrange the letters of one string to form the other...read more
Q7. Queue Using Stacks Implementation
Design a queue data structure following the FIFO (First In First Out) principle using only stack instances.
Explanation:
Your task is to complete predefined functions to suppor...read more
Q8. Print Permutations - String Problem Statement
Given an input string 'S', you are tasked with finding and returning all possible permutations of the input string.
Input:
The first and only line of input contains...read more
Q9. Rat in a Maze Problem Statement
You need to determine all possible paths for a rat starting at position (0, 0) in a square maze to reach its destination at (N-1, N-1). The maze is represented as an N*N matrix w...read more
Q10. Minimum Number of Swaps to Sort an Array
Find the minimum number of swaps required to sort a given array of distinct elements in ascending order.
Input:
T (number of test cases)
For each test case:
N (size of the...read more
Q11. Guesstimate on how many flights on a day in Delhi airport
Approximately 1,200 flights per day operate from Delhi airport.
Delhi airport is one of the busiest airports in India
It operates both domestic and international flights
On average, there are around 50 flights per hour
The number of flights may vary depending on the season and day of the week
Q12. 1.What is constraints and it's types? 2.what is meant by wrapper class? 3.What is meant by string buffer? 4.Write a program to print number of count of characters in a string and remove duplicates by giving use...
read moreThis interview includes questions related to constraints, wrapper class, string buffer, and programming.
Constraints are rules that limit the values or types of data that can be entered into a field or table. There are two types of constraints: column-level and table-level constraints.
Wrapper classes are classes that encapsulate primitive data types and provide methods to manipulate them. For example, Integer is a wrapper class for the int primitive data type.
StringBuffer is a...read more
Q13. Paths in a Matrix Problem Statement
Given an 'M x N' matrix, print all the possible paths from the top-left corner to the bottom-right corner. You can only move either right (from (i,j) to (i,j+1)) or down (fro...read more
Q14. Unix: 1)How we simply find files in directory 2)count of word by using grep command 3)how we kill the particular process 4)command for findout kernal version and on which operating system we worked on 5)what is...
read moreTechnical interview questions on Unix and SQL
To find files in a directory, use the 'find' command
To count words using grep, use the '-c' option
To kill a particular process, use the 'kill' command with the process ID
To find the kernel version and operating system, use the 'uname' command
The 'top' command is used to monitor system processes and resource usage
A zombie process is a process that has completed execution but still has an entry in the process table
Joins in SQL are us...read more
Q16. Coding question: 1. remove sub string and sort alphabetically 2. reverse of a given string 3. bubble sort
Coding questions on string manipulation and sorting algorithms.
For removing a substring and sorting alphabetically, use string manipulation and sorting functions.
To reverse a string, use a loop to iterate through the string and append each character to a new string in reverse order.
For bubble sort, use nested loops to compare adjacent elements and swap them if they are in the wrong order.
Q17. From JAVA:- what is interface? What is collection in java? What is jdk, jre, and jvm? The interviewer wrote some code snippets in chat window and asked me for the output.
Q18. 1) project flow which I worked in previous organization 2)which linux operating system used 3)what is the application server in your project 4)what is the webserver 5)how you login to your application 6)what ki...
read moreQuestions related to project flow, Linux OS, application and web server, troubleshooting, ticketing tool, and handling critical situations.
Worked on Agile methodology with JIRA as ticketing tool
Used Ubuntu as the Linux operating system
Tomcat was the application server and Apache was the web server
Logged in to the application using LDAP authentication
Performed troubleshooting by analyzing logs and using debugging tools
Handled critical situations by following the incident manag...read more
Q19. Types of file in synon, types of context of fields in functions, types of fields in synon, types of screen in synon and difference, purpose of arrays in synon, how to delete single and all records in arrays in...
read moreSynon file types, field contexts, screen types, array purpose and deletion in Synon
Synon file types include physical, logical, and display files
Field contexts in functions include input, output, and both
Types of fields in Synon include alphanumeric, numeric, and date
Types of screens in Synon include inquiry, maintenance, and report
Arrays in Synon are used to store multiple values of the same data type
To delete a single record in an array, use the DELETE_ARRAY_ENTRY function
To...read more
Q22. Data Structure:- What is linked list and queue? What is Stack and Heap?
Q27. OOPS:-define OOPS? What are the features of OOPS? What are the types of inheritance? What is method overloading and overriding?
Q30. What was your experience in developing a pharmacy inventory management web application with a team of 3-5 members in collaboration with Virtusa, and what technologies did you utilize for the front-end and back-...
read moreI have experience developing a pharmacy inventory management web application with a team of 3-5 members in collaboration with Virtusa.
Utilized HTML, CSS, and JavaScript for the front-end development
Used Node.js and Express.js for the back-end development
Integrated MySQL database for storing inventory data
Implemented user authentication and authorization features
Collaborated with team members to ensure smooth development process
Q33. How many stages will be created if a spark job has 3 wide transformations and 2 narrow transformations?
There will be 4 stages created in total for the spark job.
Wide transformations trigger a shuffle and create a new stage.
Narrow transformations do not trigger a shuffle and do not create a new stage.
In this case, 3 wide transformations will create 3 new stages and 2 narrow transformations will not create new stages.
Therefore, a total of 4 stages will be created.
Q35. If more than 50K records are fetched by the SOQL in the trigger. how to handle that.
To handle more than 50K records fetched by SOQL in trigger, use batch apex or pagination.
Use batch apex to process records in smaller chunks
Implement pagination to limit the number of records fetched at a time
Consider using selective SOQL queries to reduce the number of records fetched
Avoid using SOQL queries inside loops
Use query optimizer tool to optimize SOQL queries
Q37. sql command for inserting details in table,changing them and deleting specifics ones
SQL commands for inserting, updating, and deleting data from a table.
INSERT INTO table_name (column1, column2, column3) VALUES (value1, value2, value3);
UPDATE table_name SET column1 = new_value1 WHERE condition;
DELETE FROM table_name WHERE condition;
Q40. sql command for creating a table
SQL command for creating a table
Use CREATE TABLE statement
Specify table name and column names with data types
Add any constraints or indexes as needed
Q43. Explain How was your syllobus was done in Lockdown at College?
During lockdown, my college syllabus was completed through online classes and self-study.
Online classes were conducted through video conferencing platforms like Zoom or Google Meet.
Assignments and exams were taken online using tools like Google Classroom or Moodle.
Self-study involved reading textbooks, watching online tutorials, and practicing coding exercises.
Regular communication with professors and classmates through emails or discussion forums.
Adapted to the new learning ...read more
Q45. From DBMS:- What is joins? What are the types of join? He wrote a table on the chat window and asked me to find the left outer join.
Q47. If you have 20 to 40 range, what testing technique will you use?
I would use boundary value analysis testing technique.
Boundary value analysis involves testing the boundaries of valid and invalid input ranges.
It helps in identifying any issues that may occur at the boundaries of the input range.
Examples include testing a function with inputs just below, at, and just above the specified range limits.
Q49. write trigger , there are 3 objects, a is parent, b child, c is grand child, when grand child updated update grand child desc on a object desc
Write a trigger to update the description field on the parent object when the grandchild object is updated.
Create a trigger on the grandchild object
Use a SOQL query to retrieve the parent object
Update the description field on the parent object with the grandchild's description
Q50. Can you write code for printing a star in java
Yes, I can write code for printing a star in Java.
Create an array of strings to represent the star
Use a loop to iterate through each row of the array
Use another loop to iterate through each column of the array
Print the value at each row and column position
Example: String[] star = {" * ", " *** ", "*****", " *** ", " * "};
Example: for (String row : star) { System.out.println(row); }
Q51. Difference between partial and render partial in MVC?
Partial is used to render a specific portion of a view, while render partial is used to render a partial view within another view in MVC.
Partial is used to render a specific portion of a view in MVC.
Render partial is used to render a partial view within another view in MVC.
Partial can be used to render a reusable piece of code in multiple views.
Render partial is useful for rendering common elements like headers or footers in multiple views.
Example: <%= render partial: 'header...read more
Q52. Steps in recognition revenue, Revenue entries, Month end closures
Steps in revenue recognition, revenue entries, and month-end closures for Financial Accountant role.
Revenue recognition involves identifying the transaction, determining the amount of revenue to be recognized, and allocating the revenue to the appropriate period.
Revenue entries are recorded in the general ledger and include debiting accounts receivable and crediting revenue accounts.
Month-end closures involve reconciling revenue accounts, preparing financial statements, and c...read more
Q53. What is error,bug lifecycle,regression,stlc,entry and exit poitns for bug, then scenario based questions
Answering questions related to error, bug lifecycle, regression, STLC, entry and exit points for bug, and scenario-based questions.
Error is a deviation from the expected result, while a bug is a coding error that causes an error.
Bug lifecycle includes identification, reporting, prioritization, fixing, retesting, and closure.
Regression testing is performed to ensure that changes made to the software do not introduce new bugs.
STLC (Software Testing Life Cycle) includes planning...read more
Q54. Best practices, Issues faced and how they were mitigated
Best practices, issues faced, and their mitigation in the role of Lead Consultant
Implementing regular communication channels to ensure effective collaboration among team members
Establishing clear project goals and objectives to guide the team's efforts
Identifying and addressing potential risks and challenges proactively
Leveraging industry best practices and lessons learned from previous projects
Encouraging continuous learning and professional development within the team
Buildi...read more
Q55. what is access specifiers define access specifers
Access specifiers define the level of access to classes, methods, and variables in object-oriented programming.
Access specifiers include public, private, protected, and default.
Public access specifier allows access from any other class.
Private access specifier restricts access to only within the same class.
Protected access specifier allows access within the same package and subclasses.
Default access specifier (no keyword) restricts access to only within the same package.
Q56. Deferred Revenue how you recognize the same
Deferred revenue is recognized when the performance obligation is satisfied.
Deferred revenue is recognized when the performance obligation is satisfied.
It is recognized as revenue in the income statement.
It is initially recorded as a liability on the balance sheet.
Deferred revenue arises when a company receives payment for goods or services that have not yet been provided.
Examples include subscription services, prepaid rent, and gift cards.
Q57. What init used in python Sudo program on ascending order of list items as given
The init used in Python is __init__ which is a constructor method for initializing objects.
The __init__ method is called automatically when an object is created.
It takes self as the first parameter and can take additional parameters for initialization.
Example: class Car: def __init__(self, make, model): self.make = make self.model = model
In the above example, the __init__ method initializes the make and model attributes of the Car object.
Q58. trigger on opportunity to calculate sum child to parent event communication child parent LWC wire method Integration rest api
Use LWC wire method to trigger event communication from child to parent and calculate sum
Create a custom event in the child component to pass data to the parent component
Use @wire method in the parent component to listen for the custom event and calculate the sum
Integrate with a REST API to fetch additional data if needed
Q59. How do you approach performance tuning of a stored procedure?
I approach performance tuning of a stored procedure by analyzing query execution plans, optimizing indexes, and rewriting inefficient code.
Analyze query execution plans to identify bottlenecks
Optimize indexes to improve data retrieval speed
Rewrite inefficient code to reduce unnecessary processing
Consider parameter sniffing and data distribution for optimal performance
Q61. How do you manage stakeholders or business? How do you gather requirements?
I manage stakeholders by building relationships and understanding their needs. I gather requirements through active listening and documentation.
Identify key stakeholders and their needs
Build relationships and establish trust
Actively listen to their requirements and concerns
Document requirements and communicate changes
Manage expectations and provide regular updates
Use tools such as surveys, interviews, and workshops to gather requirements
Ensure requirements are aligned with bu...read more
Q62. 2)what is the difference between remove and delete?
Q63. Can you emphasize more about your advanced MS Excel using dashboards?
I have extensive experience creating advanced MS Excel dashboards using various functions and features.
I have created dynamic dashboards using pivot tables, slicers, and conditional formatting.
I am proficient in using advanced functions such as VLOOKUP, INDEX-MATCH, and SUMIFS to extract and analyze data.
I have experience in creating interactive charts and graphs to visualize data trends and insights.
I have developed automated reports using macros and VBA to streamline data p...read more
Q64. How can design thinking be used in making a digital product?
Design thinking can be used in making a digital product by focusing on user needs, prototyping, and iterating based on feedback.
Start by empathizing with the users to understand their needs and pain points
Define the problem statement and ideate potential solutions
Create prototypes to test and gather feedback from users
Iterate on the design based on feedback to improve user experience
Collaborate with cross-functional teams to ensure the product meets both user and business goa...read more
Q65. What do you know about Spark architecture?
Spark architecture is based on a master-slave architecture with a cluster manager to coordinate tasks.
Spark architecture consists of a driver program that communicates with a cluster manager to coordinate tasks.
The cluster manager allocates resources and schedules tasks on worker nodes.
Worker nodes execute the tasks and return results to the driver program.
Spark supports various cluster managers like YARN, Mesos, and standalone mode.
Spark applications can run in standalone mo...read more
Q66. what performance metrics are used in Machine Learning?
Performance metrics in Machine Learning measure the effectiveness and efficiency of models.
Accuracy: measures the proportion of correct predictions out of the total predictions made by the model.
Precision: measures the proportion of true positive predictions out of all positive predictions made by the model.
Recall: measures the proportion of true positive predictions out of all actual positive instances in the dataset.
F1 Score: a combination of precision and recall, providing...read more
Q67. What is the difference between the reduceBy and groupBy transformations in Apache Spark?
reduceBy is used to aggregate data based on key, while groupBy is used to group data based on key.
reduceBy is a transformation that combines the values of each key using an associative function and a neutral 'zero value'.
groupBy is a transformation that groups the data based on a key and returns a grouped data set.
reduceBy is more efficient for aggregating data as it reduces the data before shuffling, while groupBy shuffles all the data before grouping.
reduceBy is typically u...read more
Q68. What is the difference between RDD (Resilient Distributed Datasets) and DataFrame in Apache Spark?
RDD is a low-level abstraction representing a distributed collection of objects, while DataFrame is a higher-level abstraction representing a distributed collection of data organized into named columns.
RDD is more suitable for unstructured data and low-level transformations, while DataFrame is more suitable for structured data and high-level abstractions.
DataFrames provide optimizations like query optimization and code generation, while RDDs do not.
DataFrames support SQL quer...read more
Q69. Which in most efficient sorting algorithm amd why and what is it's time complexity.
The most efficient sorting algorithm is Quick Sort due to its average time complexity of O(n log n).
Quick Sort is efficient due to its divide and conquer approach.
It has an average time complexity of O(n log n) and a worst-case time complexity of O(n^2).
Example: Sorting an array of integers using Quick Sort.
Q70. how manual sharing works and how to see manually shared rercords
Manual sharing allows users to manually grant access to records. To see manually shared records, use the 'Sharing' button on the record detail page.
Manual sharing is a feature in Salesforce that allows users to manually grant access to records.
It is useful when users need to share specific records with other users or groups.
To manually share a record, users can click on the 'Sharing' button on the record detail page.
From there, they can add individual users or groups and spec...read more
Q71. what are oops concept what is encapsulation what is dbms
OOPs concepts are principles in object-oriented programming, encapsulation is the bundling of data and methods within a class, and DBMS stands for Database Management System.
OOPs concepts include inheritance, polymorphism, encapsulation, and abstraction
Encapsulation is the concept of bundling data and methods that operate on the data within a single unit, such as a class
DBMS is a software system that manages databases, allowing users to interact with the data stored in them
Ex...read more
Q72. what are closures and higher order components,life cycle methods etc
Closures are functions that have access to their own scope, higher order components are functions that take other functions as arguments, and life cycle methods are methods that are called at certain points in a component's life cycle.
Closures are functions that can access variables from their outer scope even after the outer function has finished executing.
Higher order components are functions that take other components as arguments and return a new component.
Life cycle meth...read more
Q73. Is a string mutable/immutable with an example
A string can be both mutable and immutable depending on the programming language.
In languages like Java and Python, strings are immutable.
In languages like C++ and C#, strings are mutable.
Immutable strings cannot be modified once created, while mutable strings can be modified.
Example of immutable string: 'hello world'.replace('o', '0') returns 'hell0 w0rld'.
Example of mutable string: string s = 'hello'; s[0] = 'j'; s now becomes 'jello'.
Q74. Diff between function and stored procedure Define abstraction and encapsulation Oops concepts in detail
A function is a block of code that performs a specific task, while a stored procedure is a named group of SQL statements.
Functions are used to return a single value, while stored procedures can return multiple values.
Functions can be called from within SQL statements, while stored procedures are called using their name.
Functions are typically used for calculations or data manipulation, while stored procedures are used for complex tasks or business logic.
Functions are defined ...read more
Q75. difference between truncate and drop
Truncate and drop are SQL commands used to remove data from a table.
Truncate removes all data from a table but keeps the structure intact.
Drop removes the entire table and its structure.
Truncate is faster than drop as it only removes data.
Drop cannot be undone while truncate can be rolled back.
Truncate resets the identity of the table while drop does not.
Examples: TRUNCATE TABLE table_name; DROP TABLE table_name;
Q76. How to use current page's Id in LWC
To use current page Id in LWC, we can import '@salesforce/apex' and call Apex method to get the Id.
Import '@salesforce/apex' in LWC JS file
Create an Apex method to return current page Id
Call the Apex method in LWC JS file using '@wire'
Access the current page Id in LWC HTML file using '{pageId}'
Q77. How does cyber ark tool manage password management for privilege functional Ids
CyberArk tool manages password management for privilege functional Ids by securely storing, rotating, and controlling access to credentials.
CyberArk stores privileged account credentials in a secure vault
It automatically rotates passwords to reduce the risk of unauthorized access
Access to passwords is controlled through policies and workflows
It provides auditing and reporting capabilities for privileged account usage
Integration with Active Directory and other systems for seam...read more
Q78. How do you onboard static privilege accounts in to cyber ark to automate the password management
Static privilege accounts can be onboarded into CyberArk for automated password management by following these steps.
Identify the static privilege accounts that need to be onboarded into CyberArk.
Create a Safe in CyberArk to store the passwords for these accounts.
Define the policies and permissions for accessing and managing these accounts within CyberArk.
Use CyberArk's REST API or CLI to automate the onboarding process by importing the account details and setting up password ...read more
Q79. Journal entries for Prepaid Accruals Depreciation with accumulated depreciation concept Provision for Bad debts DTA and DTL
Explanation of journal entries for Prepaid, Accruals, Depreciation, Provision for Bad debts, DTA, and DTL.
Prepaid expenses are initially recorded as assets and then expensed over time as they are used up.
Accruals are expenses incurred but not yet paid or revenue earned but not yet received.
Depreciation is the allocation of the cost of a fixed asset over its useful life, with accumulated depreciation representing the total depreciation expense to date.
Provision for bad debts i...read more
Q80. how to convert vb to fb
VB to FB conversion involves rewriting Visual Basic code into Facebook's programming language.
Identify the functionality and logic of the VB code
Rewrite the code using Facebook's programming language syntax
Test the converted code to ensure it functions correctly
Q81. what is the adb devices command and when we are use it
adb devices command is used to list all Android devices connected to a computer via USB debugging
Used to check the list of Android devices connected to the computer for debugging purposes
Helps in identifying the device ID and status (offline, online, unauthorized)
Commonly used in Android development for testing and debugging
Example: 'adb devices' command will display a list of connected devices with their respective status
Q82. What are dependency we added in POM.xml file for mobile automation
We added dependencies like Appium, TestNG, Selenium, and Apache POI in POM.xml for mobile automation.
Appium dependency for mobile automation testing
TestNG dependency for test execution and reporting
Selenium dependency for web automation
Apache POI dependency for reading and writing Excel files
Q83. What is PySpark, and can you explain its features and uses?
PySpark is a Python API for Apache Spark, used for big data processing and analytics.
PySpark is a Python API for Apache Spark, a fast and general-purpose cluster computing system.
It allows for easy integration with Python libraries and provides high-level APIs in Python.
PySpark can be used for processing large datasets, machine learning, real-time data streaming, and more.
It supports various data sources such as HDFS, Apache Hive, JSON, Parquet, and more.
PySpark is widely use...read more
Q84. Different between if loop and while loop Types of pointers
If loop is used for conditional execution while while loop is used for repetitive execution.
If loop executes the code block only if the condition is true, while loop executes the code block repeatedly until the condition becomes false.
If loop is used when the number of iterations is known, while loop is used when the number of iterations is unknown.
Example of if loop: if(x > 0) { //code block }
Example of while loop: while(x > 0) { //code block }
Q85. What are object oriented programming language and all..?
Object-oriented programming languages are based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.
Objects are instances of classes, which define the structure and behavior of the objects.
Encapsulation is a key feature, where data is hidden within objects and can only be accessed through methods.
Inheritance allows classes to inherit attributes and methods from other classes.
Polymorphism enables objects to be treated as i...read more
Q86. How can that data be leveraged against competitors?
Data can be leveraged against competitors by identifying trends, making informed decisions, and improving strategies.
Analyzing customer behavior to identify preferences and trends
Utilizing market research data to make informed decisions on pricing and product offerings
Benchmarking performance metrics against competitors to identify areas for improvement
Implementing data-driven strategies to stay ahead of competitors
Leveraging data analytics tools to gain insights and make str...read more
Q87. Tell us what you can see on the drawing, identify anything
The drawing shows a mechanical assembly with various components and dimensions.
Identify different parts such as gears, shafts, bearings, etc.
Note any dimensions or tolerances specified on the drawing.
Check for any annotations or symbols indicating specific features or requirements.
Q88. What are the different modes of execution in Apache Spark?
The different modes of execution in Apache Spark include local mode, standalone mode, YARN mode, and Mesos mode.
Local mode: Spark runs on a single machine with one executor.
Standalone mode: Spark runs on a cluster managed by a standalone cluster manager.
YARN mode: Spark runs on a Hadoop cluster using YARN as the resource manager.
Mesos mode: Spark runs on a Mesos cluster with Mesos as the resource manager.
Q89. coding question to remove duplicate , count frequencies of occurrence of characters
Remove duplicates and count frequencies of characters in an array of strings.
Iterate through each string in the array
Use a hashmap to store characters and their frequencies
Remove duplicates by checking if character already exists in hashmap
Q90. When to use GET, POST, PUT, DELETE (Rest methods)
GET for retrieving data, POST for creating data, PUT for updating data, DELETE for deleting data
GET: Used to retrieve data from a server
POST: Used to create new data on a server
PUT: Used to update existing data on a server
DELETE: Used to delete data on a server
Example: GET request to fetch user information, POST request to create a new user, PUT request to update user details, DELETE request to delete a user
Q91. How to improve test coverage of a class.
To improve test coverage of a class, write more test cases to cover all possible scenarios.
Identify uncovered lines of code using a code coverage tool
Write test cases for each uncovered line of code
Write test cases for boundary conditions and edge cases
Use mock objects to simulate dependencies
Refactor code to make it more testable
Q92. What is difference between union and union all
UNION combines the result sets of two or more SELECT statements, while UNION ALL does the same but includes duplicate rows.
UNION removes duplicate rows from the result set, while UNION ALL includes all rows
UNION is slower than UNION ALL because it has to perform a distinct operation
UNION requires that all SELECT statements have the same number of columns with compatible data types
Q93. How to access the api deployed behind the vpc
To access the API deployed behind the VPC, you can set up a VPN connection or use a bastion host.
Set up a VPN connection to the VPC to securely access the API
Use a bastion host as a jump server to access the API
Ensure proper security group and network ACL configurations to allow access to the API from specific IP addresses
Q94. What are the Linux command you use in daily routines
I use commands like ls, cd, grep, and chmod in my daily routines on Linux.
ls - list directory contents
cd - change directory
grep - search for specific patterns in files
chmod - change file permissions
Q96. Types of matching in tmap, and difference b/w tmap and tunite
TMAP has three types of matching: exact, fuzzy, and partial. TUNITE is used for merging data from multiple sources.
TMAP has exact, fuzzy, and partial matching options for data mapping
Exact matching requires exact match of values in source and target
Fuzzy matching allows for some variation in values, such as spelling errors
Partial matching matches based on a percentage of similarity between values
TUNITE is used for merging data from multiple sources into a single output
TUNITE ...read more
Q97. write trigger on opportunity to sum of total opps and populate on account sumofopps field
Write a trigger on Opportunity to calculate the sum of total opportunities and populate it on the Account's 'SumOfOpps' field.
Create a trigger on the Opportunity object
Use an aggregate query to calculate the sum of the 'Amount' field on all related Opportunities
Update the 'SumOfOpps' field on the related Account with the calculated sum
Q98. What is the difference between props and state in React?
Props are immutable data passed from parent to child components, while state is mutable data managed within a component.
Props are read-only and cannot be modified by the component receiving them.
State is mutable and can be changed by the component that owns it.
Props are used to pass data from parent to child components, while state is used for managing component-specific data.
Example: Props can be used to pass a user's name to a child component, while state can be used to tra...read more
Q99. What are the uses of useCallback and useMemo in React?
useCallback is used to memoize functions and prevent unnecessary re-renders. useMemo is used to memoize values and prevent unnecessary calculations.
useCallback is used to optimize performance by memoizing functions that don't need to be recreated on every render.
useMemo is used to optimize performance by memoizing values that are expensive to calculate and don't need to be recalculated on every render.
Both useCallback and useMemo accept a dependency array as a second argument...read more
Q100. Find the 2nd largest element in an array with O(n) time complexity
Use a single pass algorithm to find the 2nd largest element in an array.
Iterate through the array and keep track of the largest and second largest elements.
Initialize two variables to store the largest and second largest elements.
Compare each element with the largest and second largest elements and update accordingly.
Return the second largest element at the end of the iteration.
More about working at Virtusa Consulting Services
Top HR Questions asked in Sinnonteq IT Consulting
Interview Process at Sinnonteq IT Consulting
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month