Add office photos
Employer?
Claim Account for FREE

Virtusa Consulting Services

3.8
based on 4.4k Reviews
Filter interviews by

300+ Airblack Interview Questions and Answers

Updated 15 Dec 2024
Popular Designations
Q1. Reverse Stack Using Recursion

Reverse a given stack of integers using recursion.

Note:

You are not allowed to use any extra space other than the internal stack space used due to recursion. You are not allowed to...read more
View 2 more answers
Q2. Occurrence Of Each Word

You are given a string S of words. Your task is to count the occurrence of each word present in the string S. A word is a sequence of one or more non-space characters, and there can be mu...read more

View 3 more answers
Q3. Number And Digits

You are given a positive number ‘N.’ You need to find all the numbers such that the sum of digits of those numbers to the number itself is equal to ‘N.’

For example:
You are given ‘N’ as 21, th...read more
View 3 more answers
Q4. Reverse Linked List

Given a singly linked list of integers. Your task is to return the head of the reversed linked list.

For example:
The given linked list is 1 -> 2 -> 3 -> 4-> NULL. Then the reverse linked lis...read more
View 5 more answers
Discover Airblack interview dos and don'ts from real experiences
Q5. Third greatest element

Given an array/list 'ARR' of ‘N’ distinct integers, you are supposed to find the third largest element in the given array 'ARR'.

Input Format :
The first line contains a single integer ‘T’...read more
View 3 more answers
Q6. Anagram Pairs

Pre-requisites: Anagrams are defined as words or names that can be formed by rearranging letters of another word. Such as "spar" can be formed by rearranging letters of "rasp". Hence, "spar" and "r...read more

View 3 more answers
Are these interview questions helpful?
Q7. Queue Using Stack

Implement a queue data structure which follows FIFO(First In First Out) property, using only the instances of the stack data structure.

Note:
1. To implement means you need to complete some pre...read more
View 3 more answers
Q8. Print Permutations - String

You are given an input string 'S'. Your task is to find and return all possible permutations of the input string.

Note:
1. The input string may contain the same characters, so there w...read more
View 2 more answers
Share interview questions and help millions of jobseekers 🌟
Q9. Rat In A Maze

You are given a starting position for a rat which is stuck in a maze at an initial point (0, 0) (the maze can be thought of as a 2-dimensional plane). The maze would be given in the form of a squar...read more

Add your answer
Q10. Minimum number of swaps required to sort an array

You have been given an array 'ARR' of 'N' distinct elements.

Your task is to find the minimum no. of swaps required to sort the array.

For example:
For the given...read more
View 3 more answers

Q11. Guesstimate on how many flights on a day in Delhi airport

Ans.

Approximately 1,200 flights per day operate from Delhi airport.

  • Delhi airport is one of the busiest airports in India

  • It operates both domestic and international flights

  • On average, there are around 50 flights per hour

  • The number of flights may vary depending on the season and day of the week

Add your answer

Q12. 1.What is constraints and it's types? 2.what is meant by wrapper class? 3.What is meant by string buffer? 4.Write a program to print number of count of characters in a string and remove duplicates by giving use...

read more
Ans.

This interview includes questions related to constraints, wrapper class, string buffer, and programming.

  • Constraints are rules that limit the values or types of data that can be entered into a field or table. There are two types of constraints: column-level and table-level constraints.

  • Wrapper classes are classes that encapsulate primitive data types and provide methods to manipulate them. For example, Integer is a wrapper class for the int primitive data type.

  • StringBuffer is a...read more

Add your answer
Q13. Technical Questions

Basic concepts of java.
What is Constructor,
what is Oops concept,
What is exceptional handling,
What is multithreading,
how to reverse a linkedlist,
What was your college project,
What is di...read more

Add your answer
Q14. Print all possible paths from top left corner to bottom right corner of a 2-D matrix

You are given an ‘M*N’ Matrix, You need to print all possible paths from its top left corner to the bottom right corner if giv...read more

Add your answer

Q15. Unix: 1)How we simply find files in directory 2)count of word by using grep command 3)how we kill the particular process 4)command for findout kernal version and on which operating system we worked on 5)what is...

read more
Ans.

Technical interview questions on Unix and SQL

  • To find files in a directory, use the 'find' command

  • To count words using grep, use the '-c' option

  • To kill a particular process, use the 'kill' command with the process ID

  • To find the kernel version and operating system, use the 'uname' command

  • The 'top' command is used to monitor system processes and resource usage

  • A zombie process is a process that has completed execution but still has an entry in the process table

  • Joins in SQL are us...read more

Add your answer
Q16. DBMS Question

What are the three levels of data abstraction?

Add your answer

Q17. Coding question: 1. remove sub string and sort alphabetically 2. reverse of a given string 3. bubble sort

Ans.

Coding questions on string manipulation and sorting algorithms.

  • For removing a substring and sorting alphabetically, use string manipulation and sorting functions.

  • To reverse a string, use a loop to iterate through the string and append each character to a new string in reverse order.

  • For bubble sort, use nested loops to compare adjacent elements and swap them if they are in the wrong order.

Add your answer

Q18. From JAVA:- what is interface? What is collection in java? What is jdk, jre, and jvm? The interviewer wrote some code snippets in chat window and asked me for the output.

Add your answer

Q19. 1) project flow which I worked in previous organization 2)which linux operating system used 3)what is the application server in your project 4)what is the webserver 5)how you login to your application 6)what ki...

read more
Ans.

Questions related to project flow, Linux OS, application and web server, troubleshooting, ticketing tool, and handling critical situations.

  • Worked on Agile methodology with JIRA as ticketing tool

  • Used Ubuntu as the Linux operating system

  • Tomcat was the application server and Apache was the web server

  • Logged in to the application using LDAP authentication

  • Performed troubleshooting by analyzing logs and using debugging tools

  • Handled critical situations by following the incident manag...read more

Add your answer

Q20. Types of file in synon, types of context of fields in functions, types of fields in synon, types of screen in synon and difference, purpose of arrays in synon, how to delete single and all records in arrays in ...

read more
Ans.

Synon file types, field contexts, screen types, array purpose and deletion in Synon

  • Synon file types include physical, logical, and display files

  • Field contexts in functions include input, output, and both

  • Types of fields in Synon include alphanumeric, numeric, and date

  • Types of screens in Synon include inquiry, maintenance, and report

  • Arrays in Synon are used to store multiple values of the same data type

  • To delete a single record in an array, use the DELETE_ARRAY_ENTRY function

  • To...read more

Add your answer
Q21. Java Question

What is the difference between JDK, JRE, and JVM?

Add your answer
Q22. HTML Question

What are some of the advantages of HTML5 over its previous versions?

Add your answer
Q23. HTML Question

What are the various formatting tags in HTML?

Add your answer

Q24. Data Structure:- What is linked list and queue? What is Stack and Heap?

Add your answer
Q25. DBMS Question

What is Cursor? How to use a Cursor?

Add your answer
Q26. DBMS Question

What is meant by normalization and denormalization?

Add your answer
Q27. CSS Question

Difference between reset vs normalize CSS?. How do they differ?

Add your answer
Q28. Technical Questions

What is the difference between SQL and NoSQL databases?

Write the code for the both semaphore oprations.

Add your answer
Q29. JavaScript Question

What is the difference between .call() and .apply()?

Add your answer
Q30. Assignment

One use case was given as Account Statements Transcription to be done as a full stack application to convert the uploading excell sheet document into sql table and fetch it as per user needs in the UI...read more

Add your answer
Q31. Java Question

How would you differentiate between a String, StringBuffer, and a StringBuilder?

Add your answer
Q32. JavaScript Question

How do you compare Object and Map

Add your answer
Q33. System Design Question

How you setup the architecture in azure when client is moving to cloud from on-prem?

Add your answer

Q34. OOPS:-define OOPS? What are the features of OOPS? What are the types of inheritance? What is method overloading and overriding?

Add your answer
Q35. Kafka Question

What are the use cases of Kafka monitoring?

Add your answer
Q36. Spring Boot Question

What are the major differences between RequestMapping and GetMapping?

Add your answer
Q37. CSS Question

What is a z-index, how does it function?

Add your answer
Q38. Kafka Question

What are the four core API architectures that Kafka uses?

Add your answer
Q39. Spring Boot Question

What Are the Basic Annotations that Spring Boot Offers?

Add your answer

Q40. How many stages will be created if a spark job has 3 wide transformations and 2 narrow transformations?

Ans.

There will be 4 stages created in total for the spark job.

  • Wide transformations trigger a shuffle and create a new stage.

  • Narrow transformations do not trigger a shuffle and do not create a new stage.

  • In this case, 3 wide transformations will create 3 new stages and 2 narrow transformations will not create new stages.

  • Therefore, a total of 4 stages will be created.

Add your answer
Q41. JavaScript Question

What is the difference between let and var

Add your answer
Q42. Spring Boot Question

What is the root application context in Spring MVC? How is it loaded?

Add your answer

Q43. If more than 50K records are fetched by the SOQL in the trigger. how to handle that.

Ans.

To handle more than 50K records fetched by SOQL in trigger, use batch apex or pagination.

  • Use batch apex to process records in smaller chunks

  • Implement pagination to limit the number of records fetched at a time

  • Consider using selective SOQL queries to reduce the number of records fetched

  • Avoid using SOQL queries inside loops

  • Use query optimizer tool to optimize SOQL queries

Add your answer
Q44. SQL Question

Combine Two Tables

Add your answer

Q45. sql command for inserting details in table,changing them and deleting specifics ones

Ans.

SQL commands for inserting, updating, and deleting data from a table.

  • INSERT INTO table_name (column1, column2, column3) VALUES (value1, value2, value3);

  • UPDATE table_name SET column1 = new_value1 WHERE condition;

  • DELETE FROM table_name WHERE condition;

Add your answer
Q46. Java Question

Difference between Abstract class and Interface.

Add your answer
Q47. Spring Boot Question

How does Spring Boot works?

Add your answer

Q48. sql command for creating a table

Ans.

SQL command for creating a table

  • Use CREATE TABLE statement

  • Specify table name and column names with data types

  • Add any constraints or indexes as needed

View 1 answer
Q49. Technical Questions

Introduction , Projects and technologies worked on , sql queries like select , insert , difference between delete , truncate, drop , synchronized & asynchronized programming , oops properties...read more

Add your answer
Q50. Spring Boot Question

What is dependency Injection?

Add your answer
Q51. Hibernate Question

How do you create an immutable class in hibernate?

Add your answer

Q52. Explain How was your syllobus was done in Lockdown at College?

Ans.

During lockdown, my college syllabus was completed through online classes and self-study.

  • Online classes were conducted through video conferencing platforms like Zoom or Google Meet.

  • Assignments and exams were taken online using tools like Google Classroom or Moodle.

  • Self-study involved reading textbooks, watching online tutorials, and practicing coding exercises.

  • Regular communication with professors and classmates through emails or discussion forums.

  • Adapted to the new learning ...read more

Add your answer

Q53. Can you write code for printing a star in java

Ans.

Yes, I can write code for printing a star in Java.

  • Create an array of strings to represent the star

  • Use a loop to iterate through each row of the array

  • Use another loop to iterate through each column of the array

  • Print the value at each row and column position

  • Example: String[] star = {" * ", " *** ", "*****", " *** ", " * "};

  • Example: for (String row : star) { System.out.println(row); }

Add your answer
Q54. Java Question

Explain the use of final keyword in variable, method and class.

Add your answer
Q55. Hibernate Question

What is hibernate caching?

Add your answer

Q56. From DBMS:- What is joins? What are the types of join? He wrote a table on the chat window and asked me to find the left outer join.

Add your answer
Q57. System Design Question

How you deploy multiple environment script using terraform

Add your answer

Q58. If you have 20 to 40 range, what testing technique will you use?

Ans.

I would use boundary value analysis testing technique.

  • Boundary value analysis involves testing the boundaries of valid and invalid input ranges.

  • It helps in identifying any issues that may occur at the boundaries of the input range.

  • Examples include testing a function with inputs just below, at, and just above the specified range limits.

Add your answer
Q59. Spring Boot Question

Explain @RestController annotation in Sprint boot?

Add your answer

Q60. write trigger , there are 3 objects, a is parent, b child, c is grand child, when grand child updated update grand child desc on a object desc

Ans.

Write a trigger to update the description field on the parent object when the grandchild object is updated.

  • Create a trigger on the grandchild object

  • Use a SOQL query to retrieve the parent object

  • Update the description field on the parent object with the grandchild's description

View 1 answer

Q61. Difference between partial and render partial in MVC?

Ans.

Partial is used to render a specific portion of a view, while render partial is used to render a partial view within another view in MVC.

  • Partial is used to render a specific portion of a view in MVC.

  • Render partial is used to render a partial view within another view in MVC.

  • Partial can be used to render a reusable piece of code in multiple views.

  • Render partial is useful for rendering common elements like headers or footers in multiple views.

  • Example: <%= render partial: 'header...read more

Add your answer

Q62. Steps in recognition revenue, Revenue entries, Month end closures

Ans.

Steps in revenue recognition, revenue entries, and month-end closures for Financial Accountant role.

  • Revenue recognition involves identifying the transaction, determining the amount of revenue to be recognized, and allocating the revenue to the appropriate period.

  • Revenue entries are recorded in the general ledger and include debiting accounts receivable and crediting revenue accounts.

  • Month-end closures involve reconciling revenue accounts, preparing financial statements, and c...read more

Add your answer

Q63. What is error,bug lifecycle,regression,stlc,entry and exit poitns for bug, then scenario based questions

Ans.

Answering questions related to error, bug lifecycle, regression, STLC, entry and exit points for bug, and scenario-based questions.

  • Error is a deviation from the expected result, while a bug is a coding error that causes an error.

  • Bug lifecycle includes identification, reporting, prioritization, fixing, retesting, and closure.

  • Regression testing is performed to ensure that changes made to the software do not introduce new bugs.

  • STLC (Software Testing Life Cycle) includes planning...read more

Add your answer

Q64. Best practices, Issues faced and how they were mitigated

Ans.

Best practices, issues faced, and their mitigation in the role of Lead Consultant

  • Implementing regular communication channels to ensure effective collaboration among team members

  • Establishing clear project goals and objectives to guide the team's efforts

  • Identifying and addressing potential risks and challenges proactively

  • Leveraging industry best practices and lessons learned from previous projects

  • Encouraging continuous learning and professional development within the team

  • Buildi...read more

View 1 answer

Q65. what is access specifiers define access specifers

Ans.

Access specifiers define the level of access to classes, methods, and variables in object-oriented programming.

  • Access specifiers include public, private, protected, and default.

  • Public access specifier allows access from any other class.

  • Private access specifier restricts access to only within the same class.

  • Protected access specifier allows access within the same package and subclasses.

  • Default access specifier (no keyword) restricts access to only within the same package.

Add your answer

Q66. Deferred Revenue how you recognize the same

Ans.

Deferred revenue is recognized when the performance obligation is satisfied.

  • Deferred revenue is recognized when the performance obligation is satisfied.

  • It is recognized as revenue in the income statement.

  • It is initially recorded as a liability on the balance sheet.

  • Deferred revenue arises when a company receives payment for goods or services that have not yet been provided.

  • Examples include subscription services, prepaid rent, and gift cards.

Add your answer

Q67. What init used in python Sudo program on ascending order of list items as given

Ans.

The init used in Python is __init__ which is a constructor method for initializing objects.

  • The __init__ method is called automatically when an object is created.

  • It takes self as the first parameter and can take additional parameters for initialization.

  • Example: class Car: def __init__(self, make, model): self.make = make self.model = model

  • In the above example, the __init__ method initializes the make and model attributes of the Car object.

Add your answer

Q68. How do you approach performance tuning of a stored procedure?

Ans.

I approach performance tuning of a stored procedure by analyzing query execution plans, optimizing indexes, and rewriting inefficient code.

  • Analyze query execution plans to identify bottlenecks

  • Optimize indexes to improve data retrieval speed

  • Rewrite inefficient code to reduce unnecessary processing

  • Consider parameter sniffing and data distribution for optimal performance

Add your answer
Q69. SQL Questions

Create 2 tables and perform different operations.

Add your answer

Q70. How do you manage stakeholders or business? How do you gather requirements?

Ans.

I manage stakeholders by building relationships and understanding their needs. I gather requirements through active listening and documentation.

  • Identify key stakeholders and their needs

  • Build relationships and establish trust

  • Actively listen to their requirements and concerns

  • Document requirements and communicate changes

  • Manage expectations and provide regular updates

  • Use tools such as surveys, interviews, and workshops to gather requirements

  • Ensure requirements are aligned with bu...read more

Add your answer

Q71. 2)what is the difference between remove and delete?

Add your answer

Q72. How can design thinking be used in making a digital product?

Ans.

Design thinking can be used in making a digital product by focusing on user needs, prototyping, and iterating based on feedback.

  • Start by empathizing with the users to understand their needs and pain points

  • Define the problem statement and ideate potential solutions

  • Create prototypes to test and gather feedback from users

  • Iterate on the design based on feedback to improve user experience

  • Collaborate with cross-functional teams to ensure the product meets both user and business goa...read more

Add your answer

Q73. Can you emphasize more about your advanced MS Excel using dashboards?

Ans.

I have extensive experience creating advanced MS Excel dashboards using various functions and features.

  • I have created dynamic dashboards using pivot tables, slicers, and conditional formatting.

  • I am proficient in using advanced functions such as VLOOKUP, INDEX-MATCH, and SUMIFS to extract and analyze data.

  • I have experience in creating interactive charts and graphs to visualize data trends and insights.

  • I have developed automated reports using macros and VBA to streamline data p...read more

Add your answer

Q74. What do you know about Spark architecture?

Ans.

Spark architecture is based on a master-slave architecture with a cluster manager to coordinate tasks.

  • Spark architecture consists of a driver program that communicates with a cluster manager to coordinate tasks.

  • The cluster manager allocates resources and schedules tasks on worker nodes.

  • Worker nodes execute the tasks and return results to the driver program.

  • Spark supports various cluster managers like YARN, Mesos, and standalone mode.

  • Spark applications can run in standalone mo...read more

Add your answer

Q75. what performance metrics are used in Machine Learning?

Ans.

Performance metrics in Machine Learning measure the effectiveness and efficiency of models.

  • Accuracy: measures the proportion of correct predictions out of the total predictions made by the model.

  • Precision: measures the proportion of true positive predictions out of all positive predictions made by the model.

  • Recall: measures the proportion of true positive predictions out of all actual positive instances in the dataset.

  • F1 Score: a combination of precision and recall, providing...read more

Add your answer

Q76. Which in most efficient sorting algorithm amd why and what is it's time complexity.

Ans.

The most efficient sorting algorithm is Quick Sort due to its average time complexity of O(n log n).

  • Quick Sort is efficient due to its divide and conquer approach.

  • It has an average time complexity of O(n log n) and a worst-case time complexity of O(n^2).

  • Example: Sorting an array of integers using Quick Sort.

Add your answer

Q77. how manual sharing works and how to see manually shared rercords

Ans.

Manual sharing allows users to manually grant access to records. To see manually shared records, use the 'Sharing' button on the record detail page.

  • Manual sharing is a feature in Salesforce that allows users to manually grant access to records.

  • It is useful when users need to share specific records with other users or groups.

  • To manually share a record, users can click on the 'Sharing' button on the record detail page.

  • From there, they can add individual users or groups and spec...read more

Add your answer

Q78. what are oops concept what is encapsulation what is dbms

Ans.

OOPs concepts are principles in object-oriented programming, encapsulation is the bundling of data and methods within a class, and DBMS stands for Database Management System.

  • OOPs concepts include inheritance, polymorphism, encapsulation, and abstraction

  • Encapsulation is the concept of bundling data and methods that operate on the data within a single unit, such as a class

  • DBMS is a software system that manages databases, allowing users to interact with the data stored in them

  • Ex...read more

Add your answer

Q79. what are closures and higher order components,life cycle methods etc

Ans.

Closures are functions that have access to their own scope, higher order components are functions that take other functions as arguments, and life cycle methods are methods that are called at certain points in a component's life cycle.

  • Closures are functions that can access variables from their outer scope even after the outer function has finished executing.

  • Higher order components are functions that take other components as arguments and return a new component.

  • Life cycle meth...read more

Add your answer

Q80. Diff between function and stored procedure Define abstraction and encapsulation Oops concepts in detail

Ans.

A function is a block of code that performs a specific task, while a stored procedure is a named group of SQL statements.

  • Functions are used to return a single value, while stored procedures can return multiple values.

  • Functions can be called from within SQL statements, while stored procedures are called using their name.

  • Functions are typically used for calculations or data manipulation, while stored procedures are used for complex tasks or business logic.

  • Functions are defined ...read more

Add your answer

Q81. Is a string mutable/immutable with an example

Ans.

A string can be both mutable and immutable depending on the programming language.

  • In languages like Java and Python, strings are immutable.

  • In languages like C++ and C#, strings are mutable.

  • Immutable strings cannot be modified once created, while mutable strings can be modified.

  • Example of immutable string: 'hello world'.replace('o', '0') returns 'hell0 w0rld'.

  • Example of mutable string: string s = 'hello'; s[0] = 'j'; s now becomes 'jello'.

Add your answer

Q82. When to use GET, POST, PUT, DELETE (Rest methods)

Ans.

GET for retrieving data, POST for creating data, PUT for updating data, DELETE for deleting data

  • GET: Used to retrieve data from a server

  • POST: Used to create new data on a server

  • PUT: Used to update existing data on a server

  • DELETE: Used to delete data on a server

  • Example: GET request to fetch user information, POST request to create a new user, PUT request to update user details, DELETE request to delete a user

Add your answer

Q83. difference between truncate and drop

Ans.

Truncate and drop are SQL commands used to remove data from a table.

  • Truncate removes all data from a table but keeps the structure intact.

  • Drop removes the entire table and its structure.

  • Truncate is faster than drop as it only removes data.

  • Drop cannot be undone while truncate can be rolled back.

  • Truncate resets the identity of the table while drop does not.

  • Examples: TRUNCATE TABLE table_name; DROP TABLE table_name;

Add your answer

Q84. How to use current page's Id in LWC

Ans.

To use current page Id in LWC, we can import '@salesforce/apex' and call Apex method to get the Id.

  • Import '@salesforce/apex' in LWC JS file

  • Create an Apex method to return current page Id

  • Call the Apex method in LWC JS file using '@wire'

  • Access the current page Id in LWC HTML file using '{pageId}'

View 1 answer

Q85. How does cyber ark tool manage password management for privilege functional Ids

Ans.

CyberArk tool manages password management for privilege functional Ids by securely storing, rotating, and controlling access to credentials.

  • CyberArk stores privileged account credentials in a secure vault

  • It automatically rotates passwords to reduce the risk of unauthorized access

  • Access to passwords is controlled through policies and workflows

  • It provides auditing and reporting capabilities for privileged account usage

  • Integration with Active Directory and other systems for seam...read more

Add your answer

Q86. How do you onboard static privilege accounts in to cyber ark to automate the password management

Ans.

Static privilege accounts can be onboarded into CyberArk for automated password management by following these steps.

  • Identify the static privilege accounts that need to be onboarded into CyberArk.

  • Create a Safe in CyberArk to store the passwords for these accounts.

  • Define the policies and permissions for accessing and managing these accounts within CyberArk.

  • Use CyberArk's REST API or CLI to automate the onboarding process by importing the account details and setting up password ...read more

Add your answer

Q87. how to convert vb to fb

Ans.

VB to FB conversion involves rewriting Visual Basic code into Facebook's programming language.

  • Identify the functionality and logic of the VB code

  • Rewrite the code using Facebook's programming language syntax

  • Test the converted code to ensure it functions correctly

View 1 answer

Q88. what is the adb devices command and when we are use it

Ans.

adb devices command is used to list all Android devices connected to a computer via USB debugging

  • Used to check the list of Android devices connected to the computer for debugging purposes

  • Helps in identifying the device ID and status (offline, online, unauthorized)

  • Commonly used in Android development for testing and debugging

  • Example: 'adb devices' command will display a list of connected devices with their respective status

Add your answer

Q89. What are dependency we added in POM.xml file for mobile automation

Ans.

We added dependencies like Appium, TestNG, Selenium, and Apache POI in POM.xml for mobile automation.

  • Appium dependency for mobile automation testing

  • TestNG dependency for test execution and reporting

  • Selenium dependency for web automation

  • Apache POI dependency for reading and writing Excel files

Add your answer

Q90. What is PySpark, and can you explain its features and uses?

Ans.

PySpark is a Python API for Apache Spark, used for big data processing and analytics.

  • PySpark is a Python API for Apache Spark, a fast and general-purpose cluster computing system.

  • It allows for easy integration with Python libraries and provides high-level APIs in Python.

  • PySpark can be used for processing large datasets, machine learning, real-time data streaming, and more.

  • It supports various data sources such as HDFS, Apache Hive, JSON, Parquet, and more.

  • PySpark is widely use...read more

Add your answer

Q91. What are object oriented programming language and all..?

Ans.

Object-oriented programming languages are based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.

  • Objects are instances of classes, which define the structure and behavior of the objects.

  • Encapsulation is a key feature, where data is hidden within objects and can only be accessed through methods.

  • Inheritance allows classes to inherit attributes and methods from other classes.

  • Polymorphism enables objects to be treated as i...read more

Add your answer

Q92. Different between if loop and while loop Types of pointers

Ans.

If loop is used for conditional execution while while loop is used for repetitive execution.

  • If loop executes the code block only if the condition is true, while loop executes the code block repeatedly until the condition becomes false.

  • If loop is used when the number of iterations is known, while loop is used when the number of iterations is unknown.

  • Example of if loop: if(x > 0) { //code block }

  • Example of while loop: while(x > 0) { //code block }

Add your answer

Q93. How can that data be leveraged against competitors?

Ans.

Data can be leveraged against competitors by identifying trends, making informed decisions, and improving strategies.

  • Analyzing customer behavior to identify preferences and trends

  • Utilizing market research data to make informed decisions on pricing and product offerings

  • Benchmarking performance metrics against competitors to identify areas for improvement

  • Implementing data-driven strategies to stay ahead of competitors

  • Leveraging data analytics tools to gain insights and make str...read more

Add your answer

Q94. Tell us what you can see on the drawing, identify anything

Ans.

The drawing shows a mechanical assembly with various components and dimensions.

  • Identify different parts such as gears, shafts, bearings, etc.

  • Note any dimensions or tolerances specified on the drawing.

  • Check for any annotations or symbols indicating specific features or requirements.

Add your answer

Q95. coding question to remove duplicate , count frequencies of occurrence of characters

Ans.

Remove duplicates and count frequencies of characters in an array of strings.

  • Iterate through each string in the array

  • Use a hashmap to store characters and their frequencies

  • Remove duplicates by checking if character already exists in hashmap

Add your answer

Q96. How to improve test coverage of a class.

Ans.

To improve test coverage of a class, write more test cases to cover all possible scenarios.

  • Identify uncovered lines of code using a code coverage tool

  • Write test cases for each uncovered line of code

  • Write test cases for boundary conditions and edge cases

  • Use mock objects to simulate dependencies

  • Refactor code to make it more testable

Add your answer

Q97. What is difference between union and union all

Ans.

UNION combines the result sets of two or more SELECT statements, while UNION ALL does the same but includes duplicate rows.

  • UNION removes duplicate rows from the result set, while UNION ALL includes all rows

  • UNION is slower than UNION ALL because it has to perform a distinct operation

  • UNION requires that all SELECT statements have the same number of columns with compatible data types

Add your answer

Q98. How to access the api deployed behind the vpc

Ans.

To access the API deployed behind the VPC, you can set up a VPN connection or use a bastion host.

  • Set up a VPN connection to the VPC to securely access the API

  • Use a bastion host as a jump server to access the API

  • Ensure proper security group and network ACL configurations to allow access to the API from specific IP addresses

Add your answer

Q99. What are the Linux command you use in daily routines

Ans.

I use commands like ls, cd, grep, and chmod in my daily routines on Linux.

  • ls - list directory contents

  • cd - change directory

  • grep - search for specific patterns in files

  • chmod - change file permissions

Add your answer
Q100. Hibernate Question

Explain Query Cache

Add your answer
1
2
3
4
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Airblack

based on 250 interviews in the last 1 year
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.1
 • 519 Interview Questions
3.7
 • 254 Interview Questions
4.0
 • 199 Interview Questions
4.0
 • 196 Interview Questions
3.9
 • 151 Interview Questions
3.6
 • 132 Interview Questions
View all
Top Virtusa Consulting Services Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter