Add office photos
Engaged Employer

Wipro

3.7
based on 52k Reviews
Filter interviews by

900+ Al Sharq Flexible Packaging Factories Interview Questions and Answers

Updated 3 Feb 2025
Popular Designations

Q1. What automation framework have you worked on?

Ans.

I have worked on multiple automation frameworks including Selenium, Appium, and TestNG.

  • I have experience in creating and maintaining automated test scripts using Selenium WebDriver for web applications.

  • I have also worked with Appium for mobile automation testing.

  • TestNG has been my preferred choice for test management and reporting.

  • I have also integrated automation scripts with CI/CD pipelines using tools like Jenkins.

  • I have experience in creating custom frameworks using Java ...read more

View 6 more answers

Q2. what is oops. explain pillars of oops. Why we need oops in programming?

Ans.

OOPs stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.

  • Pillars of OOPs: Inheritance, Encapsulation, Polymorphism, Abstraction

  • Inheritance: Allows a class to inherit properties and behavior from another class

  • Encapsulation: Bundling of data with the methods that operate on that data

  • Polymorphism: Ability to present the same interface for different da...read more

Add your answer

Q3. What are the OOPS concepts? Give an real life example of polymorphism.

Ans.

OOPS concepts are fundamental principles of object-oriented programming. Polymorphism allows objects to be treated as instances of their parent class.

  • OOPS concepts include inheritance, encapsulation, polymorphism, and abstraction.

  • Polymorphism allows objects of different classes to be treated as objects of a common superclass.

  • Example: In a real life scenario, a parent class 'Vehicle' can have subclasses like 'Car' and 'Truck'. Both Car and Truck can have a method 'drive()', bu...read more

Add your answer

Q4. Check Duplicate Within K Distance

Given an array of integers arr of size N and an integer K, determine if there are any duplicate elements within a distance of K from each other in the array. Return "true" if s...read more

Add your answer
Discover Al Sharq Flexible Packaging Factories interview dos and don'ts from real experiences

Q5. Do you have interest in Data science, what related projects have you done previously?

Ans.

Yes, I have a strong interest in data science. I have worked on projects involving predictive analytics and machine learning.

  • Developed a predictive maintenance model for manufacturing equipment

  • Implemented a machine learning algorithm to optimize supply chain logistics

  • Utilized data visualization techniques to identify trends and patterns in customer behavior

Add your answer

Q6. Ninja and Alien Language Order Problem

An alien dropped its dictionary while visiting Earth. The Ninja wants to determine the order of characters used in the alien language, based on the given list of words fro...read more

Add your answer
Are these interview questions helpful?

Q7. Kth Largest Element Problem Statement

Ninja enjoys working with numbers, and Alice challenges him to find the Kth largest value from a given list of numbers.

Input:

The first line contains an integer 'T', repre...read more
Add your answer

Q8. What is decorators, init? List and tuple difference

Ans.

Decorators in Python are functions that modify the behavior of other functions. __init__ is a special method used for initializing objects. Lists are mutable while tuples are immutable.

  • Decorators in Python are used to modify the behavior of functions without changing their code.

  • __init__ is a special method in Python classes used for initializing objects.

  • Lists in Python are mutable, meaning their elements can be changed after creation.

  • Tuples in Python are immutable, meaning th...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What is Stp and how it is work? What is root bridge

Ans.

STP (Spanning Tree Protocol) is a network protocol that prevents loops in Ethernet networks. It elects a root bridge to manage the network.

  • STP is a network protocol used to prevent loops in Ethernet networks.

  • It works by creating a loop-free logical topology by blocking redundant paths.

  • STP elects a root bridge, which becomes the central point of the network.

  • The root bridge is the bridge with the lowest bridge ID.

  • STP uses Bridge Protocol Data Units (BPDUs) to exchange informati...read more

View 4 more answers

Q10. How to make a thread safe object in Java?

Ans.

To make a thread safe object in Java, use synchronization or locks.

  • Use synchronized keyword to ensure only one thread can access the object at a time.

  • Use locks to provide more fine-grained control over synchronization.

  • Use thread-safe data structures like ConcurrentHashMap or AtomicInteger.

  • Avoid using static variables or mutable shared state.

  • Consider using immutable objects or thread-local variables.

  • Test the thread safety of your code using tools like JUnit or stress testing.

  • D...read more

View 1 answer

Q11. Which is the most comfortable Windows OS for you to work on? ...What is the use of DHCP? ...What is the basic use of DNS at workstations? ...What do you understand by a Default Gateway? ...How can we track the...

read more
Ans.

The most comfortable Windows OS for me to work on is Windows 10.

  • Windows 10 is user-friendly and has a familiar interface.

  • It offers improved security features compared to previous versions.

  • Windows 10 provides regular updates and compatibility with modern software.

  • It has a wide range of hardware and software support.

  • Windows 10 includes useful features like Cortana and virtual desktops.

View 1 answer

Q12. OOPS - Abstraction and how can we achieve it?

Ans.

Abstraction in OOPS is the concept of hiding the implementation details and showing only the necessary information to the user.

  • Abstraction can be achieved in OOPS by using abstract classes and interfaces.

  • Abstract classes have at least one abstract method that must be implemented by the subclasses.

  • Interfaces define a set of methods that a class must implement.

  • By using abstraction, we can focus on the essential features of an object and hide the complex implementation details.

  • F...read more

Add your answer

Q13. SQL Keys - Difference between Primary key and Foreign key.

Ans.

Primary key uniquely identifies a record in a table, while foreign key establishes a relationship between two tables.

  • Primary key ensures each record is unique in a table

  • Foreign key links a column in one table to a column in another table

  • Primary key is used to enforce entity integrity, while foreign key enforces referential integrity

Add your answer

Q14. Write a program to remove duplicate character in a string if there are multiple users in an application, and if the buttons in the applications are specific to particular user, you need to perform operation in...

read more
Ans.

Questions related to Selenium Automation and software testing

  • To remove duplicate characters in a string, use a loop and a hashset

  • To perform operations on specific buttons for a user, use conditional statements

  • To switch to a particular tab, use the window handle

  • 500 error code in Postman validation indicates a bad request

  • Primary key is a unique identifier for a record in a database

  • Roles and responsibilities in a project depend on the project and team

Add your answer

Q15. How to calculate timing of Incident which assigned to multiple group

Ans.

To calculate the timing of an incident assigned to multiple groups, determine the start and end times for each group and calculate the total duration.

  • Identify the groups to which the incident is assigned

  • Determine the start time and end time for each group's involvement

  • Calculate the duration for each group

  • Sum up the durations to get the total timing of the incident

View 2 more answers

Q16. How to achieve parallel testing in selenium using Java?

Ans.

Achieve parallel testing in Selenium using Java

  • Use TestNG framework to execute tests in parallel

  • Create multiple instances of WebDriver

  • Use ThreadLocal to maintain thread safety

  • Use Selenium Grid to distribute tests across multiple machines

  • Configure TestNG XML file to specify parallel execution mode

Add your answer

Q17. What are oops describe the paradigm.

Ans.

Object-oriented programming paradigm focuses on objects and classes to organize code and data.

  • Objects are instances of classes that encapsulate data and behavior

  • Classes define the blueprint for creating objects

  • Inheritance allows classes to inherit properties and methods from other classes

  • Polymorphism enables objects to be treated as instances of their parent class

  • Encapsulation restricts access to certain components of an object

Add your answer

Q18. 5) what all db activities can be part of transaction group ?

Ans.

DB activities that can be part of a transaction group

  • Insertion of data into a table

  • Updating data in a table

  • Deletion of data from a table

  • Creating or dropping a table

  • Altering the structure of a table

  • Executing stored procedures

  • Executing functions

  • Executing triggers

View 1 answer

Q19. why we use C language?

Ans.

C language is widely used for its efficiency, portability, and flexibility in programming embedded systems, operating systems, and applications.

  • Efficiency: C allows for low-level manipulation and direct access to hardware, making it efficient for system programming.

  • Portability: C code can be easily adapted to different platforms without major modifications.

  • Flexibility: C supports both procedural and object-oriented programming paradigms, making it versatile for various applic...read more

Add your answer

Q20. What do u know about printer...? How many types of printer are there?

Ans.

Printers are output devices that produce hard copy output from computers. There are several types of printers.

  • Types of printers include inkjet, laser, thermal, and dot matrix.

  • Inkjet printers use liquid ink sprayed through microscopic nozzles onto paper.

  • Laser printers use toner powder and heat to fuse the toner onto paper.

  • Thermal printers use heat to transfer ink onto paper.

  • Dot matrix printers use a print head that strikes an ink ribbon to create dots on paper.

  • Printers can als...read more

View 6 more answers

Q21. What is the relation between Incident and change?

Ans.

Incidents can trigger changes to prevent future incidents.

  • Incidents can reveal weaknesses in the system that require changes to prevent future incidents.

  • Changes can also cause incidents if not properly managed.

  • Incident and change management processes should be closely integrated.

  • For example, a major incident caused by a software bug may require a change to the code to prevent it from happening again.

  • Similarly, a change to a server configuration may cause an incident if not pr...read more

View 2 more answers

Q22. Tell me some keywords to make a thread safe program in java ?

Ans.

Keywords for thread safe program in Java

  • Synchronization using synchronized keyword

  • Using volatile keyword for shared variables

  • Using atomic classes for thread safe operations

  • Using thread safe collections like ConcurrentHashMap

  • Using locks and semaphores for synchronization

  • Avoiding shared mutable state

  • Using immutable objects

  • Using thread local variables

View 3 more answers

Q23. What is Singleton pattern and how to implement it?

Ans.

Singleton pattern restricts the instantiation of a class to one object.

  • Create a private constructor to restrict object creation.

  • Create a static method to return the single instance of the class.

  • Use lazy initialization to create the instance only when needed.

  • Ensure thread safety by using synchronized keyword or double-checked locking.

  • Commonly used in database connections, logging, and configuration settings.

Add your answer

Q24. What is DDOS Attack and what you will use to prevent it.

Ans.

DDOS attack is a malicious attempt to disrupt normal traffic of a targeted server or network by overwhelming it with a flood of internet traffic.

  • DDOS stands for Distributed Denial of Service

  • Attackers use multiple devices to send a huge amount of traffic to the target server or network

  • It can cause the server or network to crash or become unavailable to legitimate users

  • Prevention measures include using firewalls, load balancers, and DDOS mitigation services

Add your answer

Q25. what is EC2 ? why you used it ? How you build and deploy on AWS ?

Ans.

EC2 is a web service that provides resizable compute capacity in the cloud.

  • EC2 stands for Elastic Compute Cloud

  • It allows users to rent virtual computers on which to run their own applications

  • EC2 instances can be easily scaled up or down based on demand

  • To build and deploy on AWS, one can use services like AWS CodeDeploy, AWS CodePipeline, and AWS Elastic Beanstalk

View 2 more answers

Q26. What is diff between CTE , Temp table and Table variable

Ans.

CTE, Temp table and Table variable are used to store temporary data in SQL Server.

  • CTE (Common Table Expression) is a temporary named result set that can be referenced within a SELECT, INSERT, UPDATE, or DELETE statement.

  • Temp table is a physical table that is created in the tempdb database and can be used to store temporary data.

  • Table variable is a variable that can store a result set for later use and is similar to a temp table but is stored in memory.

  • CTE is useful for recurs...read more

Add your answer

Q27. Explain about Adapter Design pattern ? Why you have used it and explain in depth ? Is it possible to replace it ?

Ans.

Adapter pattern converts the interface of a class into another interface that clients expect.

  • Adapter pattern is used to make incompatible interfaces work together.

  • It is used when we want to reuse an existing class that doesn't have the interface we need.

  • It involves creating a wrapper class that translates the interface of one class into another interface.

  • An example is using a USB to Ethernet adapter to connect a computer to a network.

  • It is possible to replace it with other pa...read more

Add your answer

Q28. inhertence logics and accessing properties

Ans.

Inheritance logics involve the concept of classes inheriting properties and methods from other classes.

  • Inheritance allows a subclass to access properties and methods of a superclass.

  • Subclasses can override inherited methods with their own implementation.

  • Access modifiers like public, private, and protected control the visibility of inherited properties.

Add your answer

Q29. 1. What is collinearity?

Ans.

Collinearity is a phenomenon where two or more predictor variables in a regression model are highly correlated.

  • Collinearity can lead to issues such as unstable coefficients and difficulty in interpreting the importance of individual predictors.

  • It can also result in inflated standard errors and misleading statistical significance.

  • One common method to detect collinearity is to calculate the variance inflation factor (VIF) for each predictor variable.

  • Addressing collinearity may ...read more

Add your answer

Q30. can r square be negative?

Ans.

No, r square cannot be negative in statistics.

  • R square is a measure of how well the regression line fits the data points.

  • It ranges from 0 to 1, where 1 indicates a perfect fit.

  • A negative r square value would indicate that the model is worse than a horizontal line.

  • Negative r square values are not meaningful in statistical analysis.

Add your answer

Q31. How the screenshot is taken and what is the use of it

Ans.

Screenshots are captured images of the current screen. They are used for documentation, troubleshooting, and sharing information.

  • Screenshots can be taken using built-in tools like Snipping Tool or keyboard shortcuts like Print Screen.

  • Screenshots can be used to document software bugs or errors for troubleshooting purposes.

  • Screenshots can be shared with others to provide visual information or instructions.

  • Screenshots can be used for training or educational purposes.

  • Screenshots ...read more

View 1 answer

Q32. What is dynamic look up

Ans.

Dynamic look up is a process of searching for information or data at runtime based on certain criteria.

  • Dynamic look up involves searching for data or information based on changing criteria

  • It is commonly used in programming to retrieve values from a database or list dynamically

  • An example of dynamic look up is using a search function on a website to find specific products based on user input

Add your answer

Q33. Which database are you using

Ans.

I am proficient in using SQL Server for database management.

  • Proficient in SQL Server for database management

  • Experience with creating and optimizing databases

  • Knowledge of SQL queries and stored procedures

Add your answer

Q34. SCD-2, what is session log

Ans.

SCD-2 is a type of slowly changing dimension in data warehousing. Session log is a record of activities performed during a session.

  • Session log tracks changes made to data during a session

  • It helps in troubleshooting and auditing data changes

  • Session log can include details like timestamp, user performing the action, and type of change

  • It is important for maintaining data integrity in a data warehouse

Add your answer

Q35. What are the types of joins

Ans.

Types of joins include inner join, outer join, left join, right join, and full join.

  • Inner join: Returns rows when there is a match in both tables

  • Outer join: Returns all rows when there is a match in one of the tables

  • Left join: Returns all rows from the left table and the matched rows from the right table

  • Right join: Returns all rows from the right table and the matched rows from the left table

  • Full join: Returns rows when there is a match in one of the tables

Add your answer

Q36. What is the difference between Saving and current account

Ans.

Saving account is for saving money and earning interest while current account is for frequent transactions.

  • Saving account earns interest while current account does not.

  • Saving account has a limit on the number of transactions while current account does not.

  • Current account is meant for frequent transactions while saving account is not.

  • Saving account has a higher interest rate than current account.

  • Examples of saving accounts include fixed deposit accounts, recurring deposit acco...read more

View 4 more answers

Q37. ALM process? Suppose there is only dev and prod environment how we can create test environment for tester?

Ans.

To create a test environment for testers in a dev and prod setup, we can follow the ALM process.

  • Create a separate branch from the dev environment codebase for testing purposes

  • Deploy the branch to a separate environment for testing

  • Once testing is complete, merge the branch back into the dev environment

  • Deploy the updated dev environment to the prod environment

  • Ensure proper version control and documentation throughout the process

Add your answer

Q38. What is zonning .And have you ever been part of upgradation ?

Ans.

Zoning is a method of dividing a storage area network (SAN) into smaller, isolated sections to improve performance and security.

  • Zoning is used to control access to specific resources within a SAN.

  • It can be done at the port level, device level, or WWN level.

  • Zoning can be hard or soft, depending on whether it is enforced by hardware or software.

  • Upgrading a SAN may require changes to zoning configurations to accommodate new hardware or software.

  • I have been part of SAN upgrades t...read more

Add your answer

Q39. What is GPS in mapping and what is pinpoint

Ans.

GPS in mapping is a technology that uses satellites to determine location. Pinpoint is the exact location on a map.

  • GPS stands for Global Positioning System and uses satellites to determine location

  • Pinpoint is the exact location on a map, often marked with a pin or marker

  • GPS in mapping allows for accurate navigation and location tracking

  • Examples of GPS mapping applications include Google Maps and Waze

View 1 answer

Q40. 1. Why I choose Transition Management 2. Explain RFP/RFI process in detail. 3. How to calculate exact Transition duration while solutioning. 4. How to conclude with FTE count. 5. What are general problems faced...

read more
Ans.

Transition Manager interview questions on choosing transition management, RFP/RFI process, transition duration calculation, FTE count, and general problems faced during execution.

  • I chose Transition Management because of my interest in managing change and ensuring smooth transitions.

  • RFP/RFI process involves creating a request for proposal or information to solicit bids from vendors, evaluating the responses, and selecting the best fit.

  • Transition duration can be calculated by c...read more

Add your answer

Q41. How to improve accuracy for an ICR project? Lifecycle of Abbyy Flexicapture project. The architecture of Abbyy Flexicapture distributed version. How to export via the database?

Ans.

Improving accuracy for an ICR project involves training the system, optimizing image quality, and using advanced algorithms.

  • Train the system with a diverse set of data to improve recognition accuracy.

  • Optimize image quality by using high-resolution images and proper lighting.

  • Use advanced algorithms such as machine learning and natural language processing.

  • Regularly review and update the system to ensure accuracy over time.

  • Abbyy Flexicapture project lifecycle involves planning, ...read more

Add your answer

Q42. What is dqueue?

Ans.

dqueue is a data structure that allows insertion and deletion of elements from both ends.

  • dqueue stands for double-ended queue.

  • It is also known as deque.

  • It can be implemented using arrays or linked lists.

  • Examples of applications include job scheduling and CPU task management.

  • Operations include push, pop, inject, and eject.

Add your answer

Q43. ...What do you understand by a Default Gateway? ...How can we track the path of the packet going to its destination?

Ans.

Default Gateway is the IP address of the router that connects a device to other networks. We can track packet path using Traceroute.

  • Default Gateway is the first point of contact for a device when it tries to connect to other networks.

  • It acts as a mediator between the device and other networks.

  • It helps in routing the traffic to the correct destination.

  • Traceroute is a tool that can be used to track the path of a packet going to its destination.

  • It works by sending packets with i...read more

View 1 answer

Q44. Different between router and filter

Ans.

Routers are devices that direct data packets to their destination, while filters are used to block or allow specific data based on set criteria.

  • Routers determine the best path for data packets to reach their destination

  • Filters are used to block or allow specific data based on set criteria

  • Routers are commonly used in networking to connect multiple devices and manage traffic flow

  • Filters are often used in email systems to block spam or in firewalls to restrict access to certain ...read more

Add your answer

Q45. write code for Fibonacci series

Ans.

Code to generate Fibonacci series

  • Initialize an array to store Fibonacci numbers

  • Set the first two numbers in the array as 0 and 1

  • Use a loop to calculate and store subsequent Fibonacci numbers by adding the previous two numbers

Add your answer

Q46. write code for inheritance usecases

Ans.

Inheritance in object-oriented programming allows a class to inherit properties and behaviors from another class.

  • Create a base class with common properties and methods

  • Create a derived class that inherits from the base class

  • Access the base class members using super keyword

  • Override methods in the derived class if needed

  • Use inheritance to promote code reusability and maintainability

Add your answer

Q47. 3) how to achieve load balance and fault tolerance while deploying an application ?

Ans.

To achieve load balance and fault tolerance while deploying an application, we can use techniques like load balancing, clustering, and redundancy.

  • Implement load balancing to distribute incoming traffic across multiple servers.

  • Use clustering to group multiple servers together to work as a single unit.

  • Ensure redundancy by having multiple instances of critical components to handle failures.

  • Implement fault-tolerant mechanisms like automatic failover and replication.

  • Regularly moni...read more

Add your answer

Q48. Can you define AI in terms of security with suitable examples. And with a solution approach. Is AI a threat? Elaborate. What libraries of Python can be used so for security purposes?

Ans.

AI in security involves using machine learning algorithms to detect and prevent cyber threats.

  • AI can analyze large amounts of data to identify patterns and anomalies that may indicate a security breach.

  • Examples include using AI to detect malware, phishing attacks, and network intrusions.

  • AI can also be used to automate threat response and enhance incident response capabilities.

  • Python libraries like TensorFlow, Keras, and Scikit-learn can be used for building AI-based security ...read more

View 1 answer

Q49. How can you replace exists legacy monolithic application with microservices ?

Ans.

Legacy monolithic applications can be replaced with microservices by breaking down the application into smaller, independent services.

  • Identify the different functionalities of the monolithic application

  • Break down the application into smaller, independent services

  • Use APIs to communicate between the services

  • Implement containerization and orchestration for scalability and reliability

  • Gradually migrate functionality to microservices while maintaining backwards compatibility

  • Example...read more

Add your answer

Q50. WHAT IS HASHING ? AND HASH MAP IN DETAILS ALONG WITH Balanced tree

Ans.

Hashing is a technique to map data to a fixed size array. Hash Map is a data structure that uses hashing to store key-value pairs.

  • Hashing is used to quickly retrieve data from a large dataset

  • Hash function maps data to a fixed size array index

  • Collisions can occur when multiple data points map to the same index

  • Hash Map uses key-value pairs to store and retrieve data

  • Balanced tree is an alternative to Hash Map for efficient data retrieval

Add your answer

Q51. What is difference between service catalog and order guide and record producer

Ans.

Service catalog, order guide, and record producer are different components in ServiceNow for managing and fulfilling service requests.

  • Service catalog is a centralized repository of services that users can request.

  • Order guide is a collection of related services grouped together for easy selection and ordering.

  • Record producer is a form-based interface that allows users to create records in different tables.

  • Service catalog provides a self-service portal for users to browse and r...read more

View 1 answer

Q52. write a code on left join

Ans.

Code example for left join in SQL

  • Use LEFT JOIN keyword to combine rows from two tables based on a related column

  • Include the ON keyword to specify the join condition

  • Example: SELECT * FROM table1 LEFT JOIN table2 ON table1.id = table2.id

Add your answer

Q53. What is Testing? And why we use testing? What bugs do you find in website? Share your toughest experience of solving a bug and what functions did you used while solving it?

Ans.

Testing is the process of evaluating a system or component to find defects and ensure its quality.

  • Testing is done to identify defects or bugs in a system or component.

  • It helps in ensuring the quality and reliability of the software.

  • Testing involves executing test cases and comparing the actual results with expected results.

  • Different types of testing include functional testing, performance testing, security testing, etc.

  • Bugs commonly found in websites include broken links, inc...read more

View 1 answer

Q54. How to delete duplicates

Ans.

To delete duplicates in an array of strings

  • Iterate through the array and store each element in a Set to remove duplicates

  • Alternatively, use a HashMap to keep track of frequency of each element

  • Use built-in functions like filter or Set to remove duplicates

Add your answer

Q55. explain OOPs, polymorphism

Ans.

OOPs is a programming paradigm that uses objects to represent real-world entities. Polymorphism is the ability of an object to take on many forms.

  • OOPs stands for Object-Oriented Programming.

  • It focuses on creating objects that contain both data and functions.

  • Polymorphism allows objects to be treated as if they are of multiple types.

  • There are two types of polymorphism: compile-time and runtime.

  • An example of polymorphism is a shape class with different subclasses for circle, squ...read more

Add your answer

Q56. If we have a input file with one record and lookup file with 5 records and input record matches with all 5 records in lookup file. How many records will you get in output

Ans.

The output will have 5 records.

  • The input record matches with all 5 records in the lookup file.

  • Each match will result in a separate record in the output.

  • Therefore, the output will have 5 records.

View 1 answer

Q57. 19c upgradation steps Challanges faced during upgradation. Dataguard configuration Opatch rollback steps. RMAN duplication

Ans.

Upgrading to Oracle Database 19c and related challenges

  • Ensure compatibility of existing applications with 19c

  • Perform pre-upgrade tasks such as backup and patching

  • Upgrade the database using DBUA or manual methods

  • Address challenges such as deprecated features and changes in behavior

  • Configure Data Guard for high availability and disaster recovery

  • Rollback an OPatch using the -rollback option

  • Use RMAN duplication to create a copy of the database for testing or reporting

Add your answer

Q58. Which programming languages do you use regularly in your work

Ans.

I regularly use Java, Python, and SQL in my work as a Software Developer.

  • Java

  • Python

  • SQL

Add your answer

Q59. 4) Difference between shared and job shared variable ?

Ans.

Shared variables are accessible by all tasks in a process, while job shared variables are only accessible by tasks in a specific job.

  • Shared variables are used to share data between tasks in a process.

  • Job shared variables are used to share data between tasks in a specific job.

  • Shared variables can cause race conditions and should be used with caution.

  • Job shared variables are useful for passing data between tasks in a job without affecting other jobs.

Add your answer

Q60. How will you perform risk assessment for an application.

Ans.

Risk assessment for an application involves identifying potential threats and vulnerabilities and evaluating their impact.

  • Identify potential threats and vulnerabilities

  • Evaluate the impact of each threat or vulnerability

  • Determine the likelihood of each threat or vulnerability occurring

  • Prioritize risks based on their impact and likelihood

  • Develop a plan to mitigate or manage each risk

Add your answer

Q61. In a page there are two login button available, So will it have same ID?

Ans.

No, the two login buttons should not have the same ID.

  • IDs should be unique for each element on a page

  • Having two elements with the same ID can cause issues with locating and interacting with the elements

View 1 answer

Q62. Write Gcd function, implement memcpy

Ans.

Gcd function calculates greatest common divisor, memcpy function copies memory

  • Gcd function: Use Euclidean algorithm to find GCD of two numbers

  • memcpy function: Use memcpy() from string.h to copy memory from source to destination

Add your answer

Q63. What is the use of webdriver driver = new chromedriver

Ans.

WebDriver driver = new ChromeDriver is used to instantiate a new Chrome browser instance.

  • WebDriver is an interface used to automate web browsers.

  • ChromeDriver is a class that implements WebDriver interface for Chrome browser.

  • The 'new' keyword is used to create a new instance of the ChromeDriver class.

  • The instantiated driver object can be used to control the Chrome browser programmatically.

View 1 answer

Q64. How to populate manager using Server side code

Ans.

To populate manager using server-side code, you can query the user table and retrieve the manager's details based on the user's ID.

  • Use GlideRecord to query the user table

  • Retrieve the manager's details using the user's ID

  • Set the manager field with the retrieved manager's details

View 2 more answers

Q65. 2. What is R square

Ans.

R square is a statistical measure that represents the proportion of the variance in the dependent variable that is predictable from the independent variable(s).

  • R square is also known as the coefficient of determination.

  • It ranges from 0 to 1, where 0 indicates that the model does not explain any variability in the dependent variable, and 1 indicates that the model explains all the variability.

  • It is used to evaluate the goodness of fit of a regression model to the data.

  • For exam...read more

Add your answer

Q66. What is the ranges of the private ip addresses

Ans.

Private IP addresses ranges are reserved for internal networks and not routable on the internet.

  • Private IP addresses are used within a local network and are not accessible from the internet

  • There are three ranges of private IP addresses: 10.0.0.0 - 10.255.255.255, 172.16.0.0 - 172.31.255.255, and 192.168.0.0 - 192.168.255.255

  • Private IP addresses are commonly used in home and office networks to allow devices to communicate with each other

View 3 more answers

Q67. What is the Lifecycle of MIM

Ans.

The lifecycle of Major Incident Manager (MIM) involves several stages from identification to resolution.

  • Identification of major incidents

  • Logging and categorizing incidents

  • Assigning resources and forming an incident management team

  • Investigation and analysis of incidents

  • Implementing temporary workarounds or fixes

  • Communicating with stakeholders and providing updates

  • Resolving the incident and restoring normal service

  • Conducting post-incident reviews and documenting lessons learned

View 3 more answers

Q68. Explain the Order to Cash Flow ? How you book the order ? How you Invoice the order ? Scenario Based Question about If customer reject the invoice, what's the next step ?

Ans.

Order to Cash Flow involves booking orders, invoicing customers, and handling rejections.

  • Booking the order involves capturing customer details, product/service details, quantity, pricing, and delivery terms.

  • Invoicing the order includes generating an invoice with all relevant details, such as customer name, order details, pricing, and payment terms.

  • If a customer rejects the invoice, the next step is to investigate the reason for rejection, address any issues, and reissue the i...read more

View 2 more answers

Q69. What is collections framework in java?

Ans.

Collections framework is a set of classes and interfaces that provide a way to store and manipulate groups of objects in Java.

  • It includes interfaces like List, Set, and Map

  • It provides implementations of these interfaces like ArrayList, HashSet, and HashMap

  • It allows for easy manipulation and sorting of collections

  • It is part of the Java Collections API

  • Example: List names = new ArrayList<>();

  • Example: Map ages = new HashMap<>();

Add your answer

Q70. Magento 2 : What is proxy design pattern and used case

Ans.

Proxy design pattern is a structural pattern that provides a surrogate or placeholder for another object to control access to it.

  • Used to provide a level of indirection when accessing an object

  • Can be used to implement lazy loading, caching, access control, etc.

  • Example: Magento 2 uses proxy pattern to load product data only when it is needed

  • Example: Proxy pattern can be used to restrict access to sensitive data or resources

Add your answer

Q71. what is NAT gateway and where it is used.

Ans.

NAT gateway is a managed service that allows instances in a private subnet to connect to the internet.

  • NAT gateway acts as a gateway for instances in a private subnet to access the internet.

  • It provides a public IP address to instances in the private subnet.

  • It helps in controlling the inbound and outbound traffic for instances in the private subnet.

  • It is used in scenarios where instances in a private subnet need to access the internet but do not have a public IP address.

  • It is a...read more

Add your answer

Q72. What is Cpp ?

Ans.

Cpp stands for C++ programming language, an object-oriented programming language used for developing software applications.

  • Cpp is an extension of the C programming language, adding features like classes, inheritance, and polymorphism.

  • Cpp is commonly used for developing system software, device drivers, embedded software, and games.

  • Example: Cpp is used in developing applications like Microsoft Windows, Adobe Photoshop, and video games.

Add your answer

Q73. What is java ?

Ans.

Java is a high-level programming language known for its portability, security, and object-oriented features.

  • Java is platform-independent, meaning it can run on any device with a Java Virtual Machine (JVM)

  • It is object-oriented, allowing for modular and reusable code

  • Java is known for its security features, such as sandboxing to prevent malicious code execution

  • Popular frameworks and libraries in Java include Spring, Hibernate, and Apache Struts

Add your answer

Q74. How do you define Digital Transformation strategy for a client ?

Ans.

Digital Transformation strategy for a client involves identifying areas of improvement and implementing technology solutions to enhance business operations.

  • Understand the client's business goals and objectives

  • Identify areas of improvement and pain points

  • Evaluate existing technology infrastructure

  • Develop a roadmap for implementing new technology solutions

  • Ensure alignment with business strategy and goals

  • Provide training and support for employees

  • Continuously monitor and evaluate...read more

Add your answer

Q75. How do you manage code deployment at your facility?

Ans.

We use a combination of automated and manual deployment processes to ensure code is deployed efficiently and accurately.

  • We have a continuous integration and deployment pipeline set up using tools like Jenkins and Ansible.

  • We also have a manual deployment process where a designated team member reviews and approves the deployment.

  • We use version control systems like Git to manage code changes and ensure that only approved changes are deployed.

  • We have a rollback plan in place in c...read more

Add your answer

Q76. What is Google mapping

Ans.

Google Maps is a web mapping service developed by Google. It offers satellite imagery, street maps, 360° panoramic views of streets, real-time traffic conditions, and route planning.

  • Provides detailed maps and satellite imagery of locations worldwide

  • Offers real-time traffic updates and route planning

  • Includes 360° panoramic views of streets

  • Can be used for navigation and exploring new places

  • Has features like Street View, indoor maps, and local business information

View 2 more answers

Q77. find integer of array , that is not present in given array ?

Ans.

Finding an integer not present in a given array.

  • Iterate through the array and mark the presence of each integer in a hash table.

  • Then iterate through the hash table to find the missing integer.

  • Alternatively, sort the array and iterate through to find the first missing integer.

Add your answer

Q78. Magento 2: What s dependency Injection elaborate it

Ans.

Dependency Injection is a design pattern used in Magento 2 to inject dependencies into a class.

  • Dependency Injection is a way to achieve loose coupling between classes.

  • It allows for easier testing and maintenance of code.

  • In Magento 2, dependencies are injected through constructor or setter methods.

  • Example: injecting a logger object into a class that needs to log messages.

Add your answer

Q79. What version of SNOW Do we use?

Ans.

We use version X of SNOW.

  • The current version of SNOW we use is X.

  • We upgraded to version X last year.

  • All incidents are logged in SNOW version X.

View 3 more answers

Q80. difference between c and c#

Ans.

C is a procedural programming language, while C# is an object-oriented programming language developed by Microsoft.

  • C is a procedural programming language, while C# is an object-oriented programming language.

  • C is widely used for system programming and embedded systems, while C# is commonly used for developing Windows applications and web services.

  • C does not have built-in support for classes and objects, while C# does.

  • C# is part of the .NET framework, while C is not.

  • Example: C ...read more

Add your answer

Q81. What all colours what they indecate

Ans.

Colors on Google Maps indicate different types of locations and features.

  • Blue: water bodies

  • Green: parks and forests

  • Yellow: areas of interest

  • Orange: shopping areas

  • Red: traffic congestion

  • Gray: areas with limited Street View coverage

View 2 more answers

Q82. How much time you will take to handle a query or a ticket?

Ans.

The time taken to handle a query or ticket depends on various factors such as complexity, resources available, and priority.

  • The time taken can vary from a few minutes to several hours or even days.

  • Simple queries or tickets that require basic troubleshooting can be resolved quickly.

  • Complex issues that require in-depth analysis or involvement of multiple teams may take longer to resolve.

  • The availability of resources, such as skilled technicians or necessary equipment, can impac...read more

View 1 answer

Q83. What is DataParameter in TestNG?

Ans.

DataParameter is a TestNG annotation used to pass data to test methods.

  • DataParameter is used to pass data to test methods in TestNG

  • It is used in conjunction with DataProvider to provide test data

  • DataParameter can be used to pass multiple parameters to a test method

  • Example: @Test(dataProvider = "dp", dataProviderClass = TestData.class)

  • Example: public void testMethod(@DataParameter("username") String username, @DataParameter("password") String password)

Add your answer

Q84. Do you familiar to DHCP how it works?

Ans.

DHCP is a network protocol that assigns IP addresses automatically to devices on a network.

  • DHCP stands for Dynamic Host Configuration Protocol

  • It allows devices to obtain IP addresses, subnet masks, default gateways, and DNS servers automatically

  • DHCP servers lease IP addresses to devices for a specific period of time

  • DHCP reduces the need for manual IP address configuration

  • Example: When a device connects to a Wi-Fi network, DHCP assigns it an IP address from the available pool

View 3 more answers

Q85. How to config dns sinkhole for malicious domains on palo alto?

Ans.

Configuring DNS sinkhole for malicious domains on Palo Alto

  • Create a security policy to block traffic to malicious domains

  • Configure DNS sinkhole profile with the list of malicious domains

  • Enable DNS sinkhole in the security policy

  • Monitor the logs for any blocked traffic

  • Update the list of malicious domains regularly

Add your answer

Q86. 1. What is reframework? 2.Difference between flowchart, sequence and state machine. 3.Tell me about environment and machine. 4.What are the activities used to fetch the data from API

Ans.

Reframework is a framework in UiPath used for building robust and scalable automation solutions.

  • Reframework is a template provided by UiPath for building automation projects.

  • It includes pre-built workflows for error handling, logging, and reusability.

  • Reframework helps in structuring the automation project in a modular and organized way.

  • It follows the best practices for developing automation solutions.

Add your answer

Q87. What is activities? Which type of activities are u using

Ans.

Activities in software engineering refer to tasks or actions performed during the development process.

  • Types of activities include requirements gathering, design, coding, testing, and deployment

  • Examples of activities are creating user stories, designing system architecture, writing code, running test cases, and releasing updates

Add your answer

Q88. Do you like programming give us example why?

Ans.

Yes, I love programming because it allows me to solve complex problems and create innovative solutions.

  • I enjoy the challenge of breaking down problems into smaller, manageable tasks.

  • I find satisfaction in seeing my code come to life and produce the desired results.

  • Programming allows me to continuously learn and improve my skills, which keeps me engaged and motivated.

Add your answer

Q89. What is a DNS DHCP networking troubleshoot active directory

Ans.

DNS, DHCP, networking, troubleshooting, and Active Directory are all related to managing and troubleshooting network services and infrastructure.

  • DNS (Domain Name System) is responsible for translating domain names into IP addresses.

  • DHCP (Dynamic Host Configuration Protocol) is used to automatically assign IP addresses to devices on a network.

  • Networking involves the design, implementation, and management of computer networks.

  • Troubleshooting is the process of identifying and re...read more

View 3 more answers

Q90. What is fraud and different ways on how we can try to stop it

Ans.

Fraud is a deliberate deception for personal gain. It can be stopped by implementing fraud prevention measures.

  • Fraud can occur in various forms such as identity theft, credit card fraud, insurance fraud, etc.

  • To prevent fraud, companies can implement measures such as background checks, fraud detection software, and employee training.

  • Consumers can protect themselves by being cautious of suspicious emails, phone calls, and websites, and regularly monitoring their financial accou...read more

View 1 answer

Q91. What is BGP and its attributes

Ans.

BGP is a routing protocol used to exchange routing information between different networks.

  • BGP stands for Border Gateway Protocol.

  • It is used to connect different autonomous systems (AS) on the internet.

  • BGP uses path vector routing to determine the best path for data to travel.

  • BGP attributes include AS path, next hop, local preference, and origin.

  • AS path is a list of AS numbers that the route has passed through.

  • Next hop is the IP address of the next router in the path.

  • Local pre...read more

View 2 more answers

Q92. How to stag a server in VM and physical environment.

Ans.

Staging a server in VM and physical environment

  • Create a VM with the same specifications as the physical server

  • Install the same operating system and software on both the VM and physical server

  • Configure the VM to mimic the network settings of the physical server

  • Test the applications and services on the VM before deploying to the physical server

  • Ensure that the VM and physical server have the same hardware and software configurations

  • Use tools like VMware vSphere or Microsoft Hype...read more

Add your answer

Q93. How to handle error in after deployed the project.

Ans.

Handle errors after project deployment

  • Implement error logging and monitoring tools

  • Create a process for reporting and resolving errors

  • Use automated testing to catch errors before deployment

  • Have a backup plan in case of critical errors

  • Regularly review and update error handling procedures

Add your answer

Q94. What are the risks associated with payroll industry.

Ans.

The risks associated with the payroll industry include compliance issues, data security breaches, and errors in processing.

  • Compliance issues: Payroll regulations and tax laws are constantly changing, and non-compliance can result in penalties and legal consequences.

  • Data security breaches: Payroll systems contain sensitive employee information, making them a target for hackers and identity theft.

  • Processing errors: Mistakes in payroll calculations or payments can lead to financ...read more

View 1 answer

Q95. How will you retrieve all the values from the drop down?

Ans.

To retrieve all values from a drop down, we can use the getOptions() method and store the values in an array of strings.

  • Locate the drop down element using any of the locators

  • Create a Select class object by passing the drop down element as a parameter

  • Use the getOptions() method to retrieve all the options from the drop down

  • Store the options in an array of strings

Add your answer

Q96. 1. Use of Apache Spark - Dataframe, Datasets and RDD. 2. Transformations and Actions in Spark. 3. Optimization in Spark 4. HIVE - Dynamic and Static Partitioning. 5. HIVE - Partitioning and Bucketing. 6. SQL -...

read more
Ans.

Questions related to Apache Spark, HIVE, and SQL.

  • Apache Spark is a distributed computing framework used for big data processing.

  • Dataframe, Datasets, and RDD are the core abstractions in Spark.

  • Transformations and Actions are the two types of operations in Spark.

  • Optimization techniques like caching, partitioning, and broadcasting can improve Spark performance.

  • HIVE is a data warehousing tool that uses SQL-like syntax to query data stored in Hadoop.

  • Dynamic and Static Partitioning...read more

Add your answer

Q97. Use a anti malware profile and call the edl with domains in it. On security acl call this antimalware profile and send them to sinkhole IPs.

Ans.

To implement anti-malware profile, call EDL with domains and send to sinkhole IPs via security ACL.

  • Create an anti-malware profile with appropriate settings

  • Create an EDL with domains to be blocked

  • Create a security ACL and call the anti-malware profile in it

  • Add the EDL to the security ACL and send traffic to sinkhole IPs

  • Regularly update the EDL with new domains

Add your answer

Q98. 1.What is DR and how you handle it.

Ans.

DR stands for Disaster Recovery. It involves implementing strategies and procedures to ensure business continuity in the event of a disaster.

  • DR is the process of preparing for and recovering from a disaster that affects the availability of IT infrastructure and services.

  • It includes creating backup systems, replicating data, and establishing failover mechanisms.

  • DR plans should be regularly tested and updated to ensure effectiveness.

  • AWS provides various services like AWS Backup...read more

View 1 answer

Q99. How to write the step execution report/result in the report?

Ans.

Use TestNG or JUnit framework to generate step execution report/result.

  • Use TestNG or JUnit annotations to mark the start and end of each test step.

  • Use TestNG or JUnit listeners to capture the test results and generate the report.

  • Use reporting libraries like ExtentReports or ReportNG to generate detailed reports with screenshots and logs.

Add your answer

Q100. What else do you do apart from programming and studies

Ans.

Apart from programming and studies, I enjoy playing sports, reading books, and volunteering.

  • Playing sports: I am an avid basketball player and participate in local leagues.

  • Reading books: I love reading fiction novels and self-help books to expand my knowledge.

  • Volunteering: I actively volunteer at a local animal shelter, helping with animal care and adoption events.

Add your answer
1
2
3
4
5
6
7
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Al Sharq Flexible Packaging Factories

based on 938 interviews
Interview experience
4.2
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.8
 • 1.4k Interview Questions
3.3
 • 449 Interview Questions
4.0
 • 245 Interview Questions
3.9
 • 202 Interview Questions
4.2
 • 153 Interview Questions
4.3
 • 135 Interview Questions
View all
Top Wipro Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter