Wipro
900+ Al Sharq Flexible Packaging Factories Interview Questions and Answers
Q1. What automation framework have you worked on?
I have worked on multiple automation frameworks including Selenium, Appium, and TestNG.
I have experience in creating and maintaining automated test scripts using Selenium WebDriver for web applications.
I have also worked with Appium for mobile automation testing.
TestNG has been my preferred choice for test management and reporting.
I have also integrated automation scripts with CI/CD pipelines using tools like Jenkins.
I have experience in creating custom frameworks using Java ...read more
Q2. what is oops. explain pillars of oops. Why we need oops in programming?
OOPs stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.
Pillars of OOPs: Inheritance, Encapsulation, Polymorphism, Abstraction
Inheritance: Allows a class to inherit properties and behavior from another class
Encapsulation: Bundling of data with the methods that operate on that data
Polymorphism: Ability to present the same interface for different da...read more
Q3. What are the OOPS concepts? Give an real life example of polymorphism.
OOPS concepts are fundamental principles of object-oriented programming. Polymorphism allows objects to be treated as instances of their parent class.
OOPS concepts include inheritance, encapsulation, polymorphism, and abstraction.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
Example: In a real life scenario, a parent class 'Vehicle' can have subclasses like 'Car' and 'Truck'. Both Car and Truck can have a method 'drive()', bu...read more
Q4. Check Duplicate Within K Distance
Given an array of integers arr
of size N
and an integer K
, determine if there are any duplicate elements within a distance of K
from each other in the array. Return "true"
if s...read more
Q5. Do you have interest in Data science, what related projects have you done previously?
Yes, I have a strong interest in data science. I have worked on projects involving predictive analytics and machine learning.
Developed a predictive maintenance model for manufacturing equipment
Implemented a machine learning algorithm to optimize supply chain logistics
Utilized data visualization techniques to identify trends and patterns in customer behavior
Q6. Ninja and Alien Language Order Problem
An alien dropped its dictionary while visiting Earth. The Ninja wants to determine the order of characters used in the alien language, based on the given list of words fro...read more
Q7. Kth Largest Element Problem Statement
Ninja enjoys working with numbers, and Alice challenges him to find the Kth largest value from a given list of numbers.
Input:
The first line contains an integer 'T', repre...read more
Q8. What is decorators, init? List and tuple difference
Decorators in Python are functions that modify the behavior of other functions. __init__ is a special method used for initializing objects. Lists are mutable while tuples are immutable.
Decorators in Python are used to modify the behavior of functions without changing their code.
__init__ is a special method in Python classes used for initializing objects.
Lists in Python are mutable, meaning their elements can be changed after creation.
Tuples in Python are immutable, meaning th...read more
Q9. What is Stp and how it is work? What is root bridge
STP (Spanning Tree Protocol) is a network protocol that prevents loops in Ethernet networks. It elects a root bridge to manage the network.
STP is a network protocol used to prevent loops in Ethernet networks.
It works by creating a loop-free logical topology by blocking redundant paths.
STP elects a root bridge, which becomes the central point of the network.
The root bridge is the bridge with the lowest bridge ID.
STP uses Bridge Protocol Data Units (BPDUs) to exchange informati...read more
Q10. How to make a thread safe object in Java?
To make a thread safe object in Java, use synchronization or locks.
Use synchronized keyword to ensure only one thread can access the object at a time.
Use locks to provide more fine-grained control over synchronization.
Use thread-safe data structures like ConcurrentHashMap or AtomicInteger.
Avoid using static variables or mutable shared state.
Consider using immutable objects or thread-local variables.
Test the thread safety of your code using tools like JUnit or stress testing.
D...read more
Q11. Which is the most comfortable Windows OS for you to work on? ...What is the use of DHCP? ...What is the basic use of DNS at workstations? ...What do you understand by a Default Gateway? ...How can we track the...
read moreThe most comfortable Windows OS for me to work on is Windows 10.
Windows 10 is user-friendly and has a familiar interface.
It offers improved security features compared to previous versions.
Windows 10 provides regular updates and compatibility with modern software.
It has a wide range of hardware and software support.
Windows 10 includes useful features like Cortana and virtual desktops.
Q12. OOPS - Abstraction and how can we achieve it?
Abstraction in OOPS is the concept of hiding the implementation details and showing only the necessary information to the user.
Abstraction can be achieved in OOPS by using abstract classes and interfaces.
Abstract classes have at least one abstract method that must be implemented by the subclasses.
Interfaces define a set of methods that a class must implement.
By using abstraction, we can focus on the essential features of an object and hide the complex implementation details.
F...read more
Q13. SQL Keys - Difference between Primary key and Foreign key.
Primary key uniquely identifies a record in a table, while foreign key establishes a relationship between two tables.
Primary key ensures each record is unique in a table
Foreign key links a column in one table to a column in another table
Primary key is used to enforce entity integrity, while foreign key enforces referential integrity
Q14. Write a program to remove duplicate character in a string if there are multiple users in an application, and if the buttons in the applications are specific to particular user, you need to perform operation in...
read moreQuestions related to Selenium Automation and software testing
To remove duplicate characters in a string, use a loop and a hashset
To perform operations on specific buttons for a user, use conditional statements
To switch to a particular tab, use the window handle
500 error code in Postman validation indicates a bad request
Primary key is a unique identifier for a record in a database
Roles and responsibilities in a project depend on the project and team
Q15. How to calculate timing of Incident which assigned to multiple group
To calculate the timing of an incident assigned to multiple groups, determine the start and end times for each group and calculate the total duration.
Identify the groups to which the incident is assigned
Determine the start time and end time for each group's involvement
Calculate the duration for each group
Sum up the durations to get the total timing of the incident
Q16. How to achieve parallel testing in selenium using Java?
Achieve parallel testing in Selenium using Java
Use TestNG framework to execute tests in parallel
Create multiple instances of WebDriver
Use ThreadLocal to maintain thread safety
Use Selenium Grid to distribute tests across multiple machines
Configure TestNG XML file to specify parallel execution mode
Q17. What are oops describe the paradigm.
Object-oriented programming paradigm focuses on objects and classes to organize code and data.
Objects are instances of classes that encapsulate data and behavior
Classes define the blueprint for creating objects
Inheritance allows classes to inherit properties and methods from other classes
Polymorphism enables objects to be treated as instances of their parent class
Encapsulation restricts access to certain components of an object
Q18. 5) what all db activities can be part of transaction group ?
DB activities that can be part of a transaction group
Insertion of data into a table
Updating data in a table
Deletion of data from a table
Creating or dropping a table
Altering the structure of a table
Executing stored procedures
Executing functions
Executing triggers
Q19. why we use C language?
C language is widely used for its efficiency, portability, and flexibility in programming embedded systems, operating systems, and applications.
Efficiency: C allows for low-level manipulation and direct access to hardware, making it efficient for system programming.
Portability: C code can be easily adapted to different platforms without major modifications.
Flexibility: C supports both procedural and object-oriented programming paradigms, making it versatile for various applic...read more
Q20. What do u know about printer...? How many types of printer are there?
Printers are output devices that produce hard copy output from computers. There are several types of printers.
Types of printers include inkjet, laser, thermal, and dot matrix.
Inkjet printers use liquid ink sprayed through microscopic nozzles onto paper.
Laser printers use toner powder and heat to fuse the toner onto paper.
Thermal printers use heat to transfer ink onto paper.
Dot matrix printers use a print head that strikes an ink ribbon to create dots on paper.
Printers can als...read more
Q21. What is the relation between Incident and change?
Incidents can trigger changes to prevent future incidents.
Incidents can reveal weaknesses in the system that require changes to prevent future incidents.
Changes can also cause incidents if not properly managed.
Incident and change management processes should be closely integrated.
For example, a major incident caused by a software bug may require a change to the code to prevent it from happening again.
Similarly, a change to a server configuration may cause an incident if not pr...read more
Q22. Tell me some keywords to make a thread safe program in java ?
Keywords for thread safe program in Java
Synchronization using synchronized keyword
Using volatile keyword for shared variables
Using atomic classes for thread safe operations
Using thread safe collections like ConcurrentHashMap
Using locks and semaphores for synchronization
Avoiding shared mutable state
Using immutable objects
Using thread local variables
Q23. What is Singleton pattern and how to implement it?
Singleton pattern restricts the instantiation of a class to one object.
Create a private constructor to restrict object creation.
Create a static method to return the single instance of the class.
Use lazy initialization to create the instance only when needed.
Ensure thread safety by using synchronized keyword or double-checked locking.
Commonly used in database connections, logging, and configuration settings.
Q24. What is DDOS Attack and what you will use to prevent it.
DDOS attack is a malicious attempt to disrupt normal traffic of a targeted server or network by overwhelming it with a flood of internet traffic.
DDOS stands for Distributed Denial of Service
Attackers use multiple devices to send a huge amount of traffic to the target server or network
It can cause the server or network to crash or become unavailable to legitimate users
Prevention measures include using firewalls, load balancers, and DDOS mitigation services
Q25. what is EC2 ? why you used it ? How you build and deploy on AWS ?
EC2 is a web service that provides resizable compute capacity in the cloud.
EC2 stands for Elastic Compute Cloud
It allows users to rent virtual computers on which to run their own applications
EC2 instances can be easily scaled up or down based on demand
To build and deploy on AWS, one can use services like AWS CodeDeploy, AWS CodePipeline, and AWS Elastic Beanstalk
Q26. What is diff between CTE , Temp table and Table variable
CTE, Temp table and Table variable are used to store temporary data in SQL Server.
CTE (Common Table Expression) is a temporary named result set that can be referenced within a SELECT, INSERT, UPDATE, or DELETE statement.
Temp table is a physical table that is created in the tempdb database and can be used to store temporary data.
Table variable is a variable that can store a result set for later use and is similar to a temp table but is stored in memory.
CTE is useful for recurs...read more
Q27. Explain about Adapter Design pattern ? Why you have used it and explain in depth ? Is it possible to replace it ?
Adapter pattern converts the interface of a class into another interface that clients expect.
Adapter pattern is used to make incompatible interfaces work together.
It is used when we want to reuse an existing class that doesn't have the interface we need.
It involves creating a wrapper class that translates the interface of one class into another interface.
An example is using a USB to Ethernet adapter to connect a computer to a network.
It is possible to replace it with other pa...read more
Q28. inhertence logics and accessing properties
Inheritance logics involve the concept of classes inheriting properties and methods from other classes.
Inheritance allows a subclass to access properties and methods of a superclass.
Subclasses can override inherited methods with their own implementation.
Access modifiers like public, private, and protected control the visibility of inherited properties.
Q29. 1. What is collinearity?
Collinearity is a phenomenon where two or more predictor variables in a regression model are highly correlated.
Collinearity can lead to issues such as unstable coefficients and difficulty in interpreting the importance of individual predictors.
It can also result in inflated standard errors and misleading statistical significance.
One common method to detect collinearity is to calculate the variance inflation factor (VIF) for each predictor variable.
Addressing collinearity may ...read more
Q30. can r square be negative?
No, r square cannot be negative in statistics.
R square is a measure of how well the regression line fits the data points.
It ranges from 0 to 1, where 1 indicates a perfect fit.
A negative r square value would indicate that the model is worse than a horizontal line.
Negative r square values are not meaningful in statistical analysis.
Q31. How the screenshot is taken and what is the use of it
Screenshots are captured images of the current screen. They are used for documentation, troubleshooting, and sharing information.
Screenshots can be taken using built-in tools like Snipping Tool or keyboard shortcuts like Print Screen.
Screenshots can be used to document software bugs or errors for troubleshooting purposes.
Screenshots can be shared with others to provide visual information or instructions.
Screenshots can be used for training or educational purposes.
Screenshots ...read more
Q32. What is dynamic look up
Dynamic look up is a process of searching for information or data at runtime based on certain criteria.
Dynamic look up involves searching for data or information based on changing criteria
It is commonly used in programming to retrieve values from a database or list dynamically
An example of dynamic look up is using a search function on a website to find specific products based on user input
Q33. Which database are you using
I am proficient in using SQL Server for database management.
Proficient in SQL Server for database management
Experience with creating and optimizing databases
Knowledge of SQL queries and stored procedures
Q34. SCD-2, what is session log
SCD-2 is a type of slowly changing dimension in data warehousing. Session log is a record of activities performed during a session.
Session log tracks changes made to data during a session
It helps in troubleshooting and auditing data changes
Session log can include details like timestamp, user performing the action, and type of change
It is important for maintaining data integrity in a data warehouse
Q35. What are the types of joins
Types of joins include inner join, outer join, left join, right join, and full join.
Inner join: Returns rows when there is a match in both tables
Outer join: Returns all rows when there is a match in one of the tables
Left join: Returns all rows from the left table and the matched rows from the right table
Right join: Returns all rows from the right table and the matched rows from the left table
Full join: Returns rows when there is a match in one of the tables
Q36. What is the difference between Saving and current account
Saving account is for saving money and earning interest while current account is for frequent transactions.
Saving account earns interest while current account does not.
Saving account has a limit on the number of transactions while current account does not.
Current account is meant for frequent transactions while saving account is not.
Saving account has a higher interest rate than current account.
Examples of saving accounts include fixed deposit accounts, recurring deposit acco...read more
Q37. ALM process? Suppose there is only dev and prod environment how we can create test environment for tester?
To create a test environment for testers in a dev and prod setup, we can follow the ALM process.
Create a separate branch from the dev environment codebase for testing purposes
Deploy the branch to a separate environment for testing
Once testing is complete, merge the branch back into the dev environment
Deploy the updated dev environment to the prod environment
Ensure proper version control and documentation throughout the process
Q38. What is zonning .And have you ever been part of upgradation ?
Zoning is a method of dividing a storage area network (SAN) into smaller, isolated sections to improve performance and security.
Zoning is used to control access to specific resources within a SAN.
It can be done at the port level, device level, or WWN level.
Zoning can be hard or soft, depending on whether it is enforced by hardware or software.
Upgrading a SAN may require changes to zoning configurations to accommodate new hardware or software.
I have been part of SAN upgrades t...read more
Q39. What is GPS in mapping and what is pinpoint
GPS in mapping is a technology that uses satellites to determine location. Pinpoint is the exact location on a map.
GPS stands for Global Positioning System and uses satellites to determine location
Pinpoint is the exact location on a map, often marked with a pin or marker
GPS in mapping allows for accurate navigation and location tracking
Examples of GPS mapping applications include Google Maps and Waze
Q40. 1. Why I choose Transition Management 2. Explain RFP/RFI process in detail. 3. How to calculate exact Transition duration while solutioning. 4. How to conclude with FTE count. 5. What are general problems faced...
read moreTransition Manager interview questions on choosing transition management, RFP/RFI process, transition duration calculation, FTE count, and general problems faced during execution.
I chose Transition Management because of my interest in managing change and ensuring smooth transitions.
RFP/RFI process involves creating a request for proposal or information to solicit bids from vendors, evaluating the responses, and selecting the best fit.
Transition duration can be calculated by c...read more
Q41. How to improve accuracy for an ICR project? Lifecycle of Abbyy Flexicapture project. The architecture of Abbyy Flexicapture distributed version. How to export via the database?
Improving accuracy for an ICR project involves training the system, optimizing image quality, and using advanced algorithms.
Train the system with a diverse set of data to improve recognition accuracy.
Optimize image quality by using high-resolution images and proper lighting.
Use advanced algorithms such as machine learning and natural language processing.
Regularly review and update the system to ensure accuracy over time.
Abbyy Flexicapture project lifecycle involves planning, ...read more
Q42. What is dqueue?
dqueue is a data structure that allows insertion and deletion of elements from both ends.
dqueue stands for double-ended queue.
It is also known as deque.
It can be implemented using arrays or linked lists.
Examples of applications include job scheduling and CPU task management.
Operations include push, pop, inject, and eject.
Q43. ...What do you understand by a Default Gateway? ...How can we track the path of the packet going to its destination?
Default Gateway is the IP address of the router that connects a device to other networks. We can track packet path using Traceroute.
Default Gateway is the first point of contact for a device when it tries to connect to other networks.
It acts as a mediator between the device and other networks.
It helps in routing the traffic to the correct destination.
Traceroute is a tool that can be used to track the path of a packet going to its destination.
It works by sending packets with i...read more
Q44. Different between router and filter
Routers are devices that direct data packets to their destination, while filters are used to block or allow specific data based on set criteria.
Routers determine the best path for data packets to reach their destination
Filters are used to block or allow specific data based on set criteria
Routers are commonly used in networking to connect multiple devices and manage traffic flow
Filters are often used in email systems to block spam or in firewalls to restrict access to certain ...read more
Q45. write code for Fibonacci series
Code to generate Fibonacci series
Initialize an array to store Fibonacci numbers
Set the first two numbers in the array as 0 and 1
Use a loop to calculate and store subsequent Fibonacci numbers by adding the previous two numbers
Q46. write code for inheritance usecases
Inheritance in object-oriented programming allows a class to inherit properties and behaviors from another class.
Create a base class with common properties and methods
Create a derived class that inherits from the base class
Access the base class members using super keyword
Override methods in the derived class if needed
Use inheritance to promote code reusability and maintainability
Q47. 3) how to achieve load balance and fault tolerance while deploying an application ?
To achieve load balance and fault tolerance while deploying an application, we can use techniques like load balancing, clustering, and redundancy.
Implement load balancing to distribute incoming traffic across multiple servers.
Use clustering to group multiple servers together to work as a single unit.
Ensure redundancy by having multiple instances of critical components to handle failures.
Implement fault-tolerant mechanisms like automatic failover and replication.
Regularly moni...read more
Q48. Can you define AI in terms of security with suitable examples. And with a solution approach. Is AI a threat? Elaborate. What libraries of Python can be used so for security purposes?
AI in security involves using machine learning algorithms to detect and prevent cyber threats.
AI can analyze large amounts of data to identify patterns and anomalies that may indicate a security breach.
Examples include using AI to detect malware, phishing attacks, and network intrusions.
AI can also be used to automate threat response and enhance incident response capabilities.
Python libraries like TensorFlow, Keras, and Scikit-learn can be used for building AI-based security ...read more
Q49. How can you replace exists legacy monolithic application with microservices ?
Legacy monolithic applications can be replaced with microservices by breaking down the application into smaller, independent services.
Identify the different functionalities of the monolithic application
Break down the application into smaller, independent services
Use APIs to communicate between the services
Implement containerization and orchestration for scalability and reliability
Gradually migrate functionality to microservices while maintaining backwards compatibility
Example...read more
Q50. WHAT IS HASHING ? AND HASH MAP IN DETAILS ALONG WITH Balanced tree
Hashing is a technique to map data to a fixed size array. Hash Map is a data structure that uses hashing to store key-value pairs.
Hashing is used to quickly retrieve data from a large dataset
Hash function maps data to a fixed size array index
Collisions can occur when multiple data points map to the same index
Hash Map uses key-value pairs to store and retrieve data
Balanced tree is an alternative to Hash Map for efficient data retrieval
Q51. What is difference between service catalog and order guide and record producer
Service catalog, order guide, and record producer are different components in ServiceNow for managing and fulfilling service requests.
Service catalog is a centralized repository of services that users can request.
Order guide is a collection of related services grouped together for easy selection and ordering.
Record producer is a form-based interface that allows users to create records in different tables.
Service catalog provides a self-service portal for users to browse and r...read more
Q52. write a code on left join
Code example for left join in SQL
Use LEFT JOIN keyword to combine rows from two tables based on a related column
Include the ON keyword to specify the join condition
Example: SELECT * FROM table1 LEFT JOIN table2 ON table1.id = table2.id
Q53. What is Testing? And why we use testing? What bugs do you find in website? Share your toughest experience of solving a bug and what functions did you used while solving it?
Testing is the process of evaluating a system or component to find defects and ensure its quality.
Testing is done to identify defects or bugs in a system or component.
It helps in ensuring the quality and reliability of the software.
Testing involves executing test cases and comparing the actual results with expected results.
Different types of testing include functional testing, performance testing, security testing, etc.
Bugs commonly found in websites include broken links, inc...read more
Q54. How to delete duplicates
To delete duplicates in an array of strings
Iterate through the array and store each element in a Set to remove duplicates
Alternatively, use a HashMap to keep track of frequency of each element
Use built-in functions like filter or Set to remove duplicates
Q55. explain OOPs, polymorphism
OOPs is a programming paradigm that uses objects to represent real-world entities. Polymorphism is the ability of an object to take on many forms.
OOPs stands for Object-Oriented Programming.
It focuses on creating objects that contain both data and functions.
Polymorphism allows objects to be treated as if they are of multiple types.
There are two types of polymorphism: compile-time and runtime.
An example of polymorphism is a shape class with different subclasses for circle, squ...read more
Q56. If we have a input file with one record and lookup file with 5 records and input record matches with all 5 records in lookup file. How many records will you get in output
The output will have 5 records.
The input record matches with all 5 records in the lookup file.
Each match will result in a separate record in the output.
Therefore, the output will have 5 records.
Q57. 19c upgradation steps Challanges faced during upgradation. Dataguard configuration Opatch rollback steps. RMAN duplication
Upgrading to Oracle Database 19c and related challenges
Ensure compatibility of existing applications with 19c
Perform pre-upgrade tasks such as backup and patching
Upgrade the database using DBUA or manual methods
Address challenges such as deprecated features and changes in behavior
Configure Data Guard for high availability and disaster recovery
Rollback an OPatch using the -rollback option
Use RMAN duplication to create a copy of the database for testing or reporting
Q58. Which programming languages do you use regularly in your work
I regularly use Java, Python, and SQL in my work as a Software Developer.
Java
Python
SQL
Q59. 4) Difference between shared and job shared variable ?
Shared variables are accessible by all tasks in a process, while job shared variables are only accessible by tasks in a specific job.
Shared variables are used to share data between tasks in a process.
Job shared variables are used to share data between tasks in a specific job.
Shared variables can cause race conditions and should be used with caution.
Job shared variables are useful for passing data between tasks in a job without affecting other jobs.
Q60. How will you perform risk assessment for an application.
Risk assessment for an application involves identifying potential threats and vulnerabilities and evaluating their impact.
Identify potential threats and vulnerabilities
Evaluate the impact of each threat or vulnerability
Determine the likelihood of each threat or vulnerability occurring
Prioritize risks based on their impact and likelihood
Develop a plan to mitigate or manage each risk
Q61. In a page there are two login button available, So will it have same ID?
No, the two login buttons should not have the same ID.
IDs should be unique for each element on a page
Having two elements with the same ID can cause issues with locating and interacting with the elements
Q62. Write Gcd function, implement memcpy
Gcd function calculates greatest common divisor, memcpy function copies memory
Gcd function: Use Euclidean algorithm to find GCD of two numbers
memcpy function: Use memcpy() from string.h to copy memory from source to destination
Q63. What is the use of webdriver driver = new chromedriver
WebDriver driver = new ChromeDriver is used to instantiate a new Chrome browser instance.
WebDriver is an interface used to automate web browsers.
ChromeDriver is a class that implements WebDriver interface for Chrome browser.
The 'new' keyword is used to create a new instance of the ChromeDriver class.
The instantiated driver object can be used to control the Chrome browser programmatically.
Q64. How to populate manager using Server side code
To populate manager using server-side code, you can query the user table and retrieve the manager's details based on the user's ID.
Use GlideRecord to query the user table
Retrieve the manager's details using the user's ID
Set the manager field with the retrieved manager's details
Q65. 2. What is R square
R square is a statistical measure that represents the proportion of the variance in the dependent variable that is predictable from the independent variable(s).
R square is also known as the coefficient of determination.
It ranges from 0 to 1, where 0 indicates that the model does not explain any variability in the dependent variable, and 1 indicates that the model explains all the variability.
It is used to evaluate the goodness of fit of a regression model to the data.
For exam...read more
Q66. What is the ranges of the private ip addresses
Private IP addresses ranges are reserved for internal networks and not routable on the internet.
Private IP addresses are used within a local network and are not accessible from the internet
There are three ranges of private IP addresses: 10.0.0.0 - 10.255.255.255, 172.16.0.0 - 172.31.255.255, and 192.168.0.0 - 192.168.255.255
Private IP addresses are commonly used in home and office networks to allow devices to communicate with each other
Q67. What is the Lifecycle of MIM
The lifecycle of Major Incident Manager (MIM) involves several stages from identification to resolution.
Identification of major incidents
Logging and categorizing incidents
Assigning resources and forming an incident management team
Investigation and analysis of incidents
Implementing temporary workarounds or fixes
Communicating with stakeholders and providing updates
Resolving the incident and restoring normal service
Conducting post-incident reviews and documenting lessons learned
Q68. Explain the Order to Cash Flow ? How you book the order ? How you Invoice the order ? Scenario Based Question about If customer reject the invoice, what's the next step ?
Order to Cash Flow involves booking orders, invoicing customers, and handling rejections.
Booking the order involves capturing customer details, product/service details, quantity, pricing, and delivery terms.
Invoicing the order includes generating an invoice with all relevant details, such as customer name, order details, pricing, and payment terms.
If a customer rejects the invoice, the next step is to investigate the reason for rejection, address any issues, and reissue the i...read more
Q69. What is collections framework in java?
Collections framework is a set of classes and interfaces that provide a way to store and manipulate groups of objects in Java.
It includes interfaces like List, Set, and Map
It provides implementations of these interfaces like ArrayList, HashSet, and HashMap
It allows for easy manipulation and sorting of collections
It is part of the Java Collections API
Example: List
names = new ArrayList<>(); Example: Map
ages = new HashMap<>();
Q70. Magento 2 : What is proxy design pattern and used case
Proxy design pattern is a structural pattern that provides a surrogate or placeholder for another object to control access to it.
Used to provide a level of indirection when accessing an object
Can be used to implement lazy loading, caching, access control, etc.
Example: Magento 2 uses proxy pattern to load product data only when it is needed
Example: Proxy pattern can be used to restrict access to sensitive data or resources
Q71. what is NAT gateway and where it is used.
NAT gateway is a managed service that allows instances in a private subnet to connect to the internet.
NAT gateway acts as a gateway for instances in a private subnet to access the internet.
It provides a public IP address to instances in the private subnet.
It helps in controlling the inbound and outbound traffic for instances in the private subnet.
It is used in scenarios where instances in a private subnet need to access the internet but do not have a public IP address.
It is a...read more
Q72. What is Cpp ?
Cpp stands for C++ programming language, an object-oriented programming language used for developing software applications.
Cpp is an extension of the C programming language, adding features like classes, inheritance, and polymorphism.
Cpp is commonly used for developing system software, device drivers, embedded software, and games.
Example: Cpp is used in developing applications like Microsoft Windows, Adobe Photoshop, and video games.
Q73. What is java ?
Java is a high-level programming language known for its portability, security, and object-oriented features.
Java is platform-independent, meaning it can run on any device with a Java Virtual Machine (JVM)
It is object-oriented, allowing for modular and reusable code
Java is known for its security features, such as sandboxing to prevent malicious code execution
Popular frameworks and libraries in Java include Spring, Hibernate, and Apache Struts
Q74. How do you define Digital Transformation strategy for a client ?
Digital Transformation strategy for a client involves identifying areas of improvement and implementing technology solutions to enhance business operations.
Understand the client's business goals and objectives
Identify areas of improvement and pain points
Evaluate existing technology infrastructure
Develop a roadmap for implementing new technology solutions
Ensure alignment with business strategy and goals
Provide training and support for employees
Continuously monitor and evaluate...read more
Q75. How do you manage code deployment at your facility?
We use a combination of automated and manual deployment processes to ensure code is deployed efficiently and accurately.
We have a continuous integration and deployment pipeline set up using tools like Jenkins and Ansible.
We also have a manual deployment process where a designated team member reviews and approves the deployment.
We use version control systems like Git to manage code changes and ensure that only approved changes are deployed.
We have a rollback plan in place in c...read more
Q76. What is Google mapping
Google Maps is a web mapping service developed by Google. It offers satellite imagery, street maps, 360° panoramic views of streets, real-time traffic conditions, and route planning.
Provides detailed maps and satellite imagery of locations worldwide
Offers real-time traffic updates and route planning
Includes 360° panoramic views of streets
Can be used for navigation and exploring new places
Has features like Street View, indoor maps, and local business information
Q77. find integer of array , that is not present in given array ?
Finding an integer not present in a given array.
Iterate through the array and mark the presence of each integer in a hash table.
Then iterate through the hash table to find the missing integer.
Alternatively, sort the array and iterate through to find the first missing integer.
Q78. Magento 2: What s dependency Injection elaborate it
Dependency Injection is a design pattern used in Magento 2 to inject dependencies into a class.
Dependency Injection is a way to achieve loose coupling between classes.
It allows for easier testing and maintenance of code.
In Magento 2, dependencies are injected through constructor or setter methods.
Example: injecting a logger object into a class that needs to log messages.
Q79. What version of SNOW Do we use?
We use version X of SNOW.
The current version of SNOW we use is X.
We upgraded to version X last year.
All incidents are logged in SNOW version X.
Q80. difference between c and c#
C is a procedural programming language, while C# is an object-oriented programming language developed by Microsoft.
C is a procedural programming language, while C# is an object-oriented programming language.
C is widely used for system programming and embedded systems, while C# is commonly used for developing Windows applications and web services.
C does not have built-in support for classes and objects, while C# does.
C# is part of the .NET framework, while C is not.
Example: C ...read more
Q81. What all colours what they indecate
Colors on Google Maps indicate different types of locations and features.
Blue: water bodies
Green: parks and forests
Yellow: areas of interest
Orange: shopping areas
Red: traffic congestion
Gray: areas with limited Street View coverage
Q82. How much time you will take to handle a query or a ticket?
The time taken to handle a query or ticket depends on various factors such as complexity, resources available, and priority.
The time taken can vary from a few minutes to several hours or even days.
Simple queries or tickets that require basic troubleshooting can be resolved quickly.
Complex issues that require in-depth analysis or involvement of multiple teams may take longer to resolve.
The availability of resources, such as skilled technicians or necessary equipment, can impac...read more
Q83. What is DataParameter in TestNG?
DataParameter is a TestNG annotation used to pass data to test methods.
DataParameter is used to pass data to test methods in TestNG
It is used in conjunction with DataProvider to provide test data
DataParameter can be used to pass multiple parameters to a test method
Example: @Test(dataProvider = "dp", dataProviderClass = TestData.class)
Example: public void testMethod(@DataParameter("username") String username, @DataParameter("password") String password)
Q84. Do you familiar to DHCP how it works?
DHCP is a network protocol that assigns IP addresses automatically to devices on a network.
DHCP stands for Dynamic Host Configuration Protocol
It allows devices to obtain IP addresses, subnet masks, default gateways, and DNS servers automatically
DHCP servers lease IP addresses to devices for a specific period of time
DHCP reduces the need for manual IP address configuration
Example: When a device connects to a Wi-Fi network, DHCP assigns it an IP address from the available pool
Q85. How to config dns sinkhole for malicious domains on palo alto?
Configuring DNS sinkhole for malicious domains on Palo Alto
Create a security policy to block traffic to malicious domains
Configure DNS sinkhole profile with the list of malicious domains
Enable DNS sinkhole in the security policy
Monitor the logs for any blocked traffic
Update the list of malicious domains regularly
Q86. 1. What is reframework? 2.Difference between flowchart, sequence and state machine. 3.Tell me about environment and machine. 4.What are the activities used to fetch the data from API
Reframework is a framework in UiPath used for building robust and scalable automation solutions.
Reframework is a template provided by UiPath for building automation projects.
It includes pre-built workflows for error handling, logging, and reusability.
Reframework helps in structuring the automation project in a modular and organized way.
It follows the best practices for developing automation solutions.
Q87. What is activities? Which type of activities are u using
Activities in software engineering refer to tasks or actions performed during the development process.
Types of activities include requirements gathering, design, coding, testing, and deployment
Examples of activities are creating user stories, designing system architecture, writing code, running test cases, and releasing updates
Q88. Do you like programming give us example why?
Yes, I love programming because it allows me to solve complex problems and create innovative solutions.
I enjoy the challenge of breaking down problems into smaller, manageable tasks.
I find satisfaction in seeing my code come to life and produce the desired results.
Programming allows me to continuously learn and improve my skills, which keeps me engaged and motivated.
Q89. What is a DNS DHCP networking troubleshoot active directory
DNS, DHCP, networking, troubleshooting, and Active Directory are all related to managing and troubleshooting network services and infrastructure.
DNS (Domain Name System) is responsible for translating domain names into IP addresses.
DHCP (Dynamic Host Configuration Protocol) is used to automatically assign IP addresses to devices on a network.
Networking involves the design, implementation, and management of computer networks.
Troubleshooting is the process of identifying and re...read more
Q90. What is fraud and different ways on how we can try to stop it
Fraud is a deliberate deception for personal gain. It can be stopped by implementing fraud prevention measures.
Fraud can occur in various forms such as identity theft, credit card fraud, insurance fraud, etc.
To prevent fraud, companies can implement measures such as background checks, fraud detection software, and employee training.
Consumers can protect themselves by being cautious of suspicious emails, phone calls, and websites, and regularly monitoring their financial accou...read more
Q91. What is BGP and its attributes
BGP is a routing protocol used to exchange routing information between different networks.
BGP stands for Border Gateway Protocol.
It is used to connect different autonomous systems (AS) on the internet.
BGP uses path vector routing to determine the best path for data to travel.
BGP attributes include AS path, next hop, local preference, and origin.
AS path is a list of AS numbers that the route has passed through.
Next hop is the IP address of the next router in the path.
Local pre...read more
Q92. How to stag a server in VM and physical environment.
Staging a server in VM and physical environment
Create a VM with the same specifications as the physical server
Install the same operating system and software on both the VM and physical server
Configure the VM to mimic the network settings of the physical server
Test the applications and services on the VM before deploying to the physical server
Ensure that the VM and physical server have the same hardware and software configurations
Use tools like VMware vSphere or Microsoft Hype...read more
Q93. How to handle error in after deployed the project.
Handle errors after project deployment
Implement error logging and monitoring tools
Create a process for reporting and resolving errors
Use automated testing to catch errors before deployment
Have a backup plan in case of critical errors
Regularly review and update error handling procedures
Q94. What are the risks associated with payroll industry.
The risks associated with the payroll industry include compliance issues, data security breaches, and errors in processing.
Compliance issues: Payroll regulations and tax laws are constantly changing, and non-compliance can result in penalties and legal consequences.
Data security breaches: Payroll systems contain sensitive employee information, making them a target for hackers and identity theft.
Processing errors: Mistakes in payroll calculations or payments can lead to financ...read more
Q95. How will you retrieve all the values from the drop down?
To retrieve all values from a drop down, we can use the getOptions() method and store the values in an array of strings.
Locate the drop down element using any of the locators
Create a Select class object by passing the drop down element as a parameter
Use the getOptions() method to retrieve all the options from the drop down
Store the options in an array of strings
Q96. 1. Use of Apache Spark - Dataframe, Datasets and RDD. 2. Transformations and Actions in Spark. 3. Optimization in Spark 4. HIVE - Dynamic and Static Partitioning. 5. HIVE - Partitioning and Bucketing. 6. SQL -...
read moreQuestions related to Apache Spark, HIVE, and SQL.
Apache Spark is a distributed computing framework used for big data processing.
Dataframe, Datasets, and RDD are the core abstractions in Spark.
Transformations and Actions are the two types of operations in Spark.
Optimization techniques like caching, partitioning, and broadcasting can improve Spark performance.
HIVE is a data warehousing tool that uses SQL-like syntax to query data stored in Hadoop.
Dynamic and Static Partitioning...read more
Q97. Use a anti malware profile and call the edl with domains in it. On security acl call this antimalware profile and send them to sinkhole IPs.
To implement anti-malware profile, call EDL with domains and send to sinkhole IPs via security ACL.
Create an anti-malware profile with appropriate settings
Create an EDL with domains to be blocked
Create a security ACL and call the anti-malware profile in it
Add the EDL to the security ACL and send traffic to sinkhole IPs
Regularly update the EDL with new domains
Q98. 1.What is DR and how you handle it.
DR stands for Disaster Recovery. It involves implementing strategies and procedures to ensure business continuity in the event of a disaster.
DR is the process of preparing for and recovering from a disaster that affects the availability of IT infrastructure and services.
It includes creating backup systems, replicating data, and establishing failover mechanisms.
DR plans should be regularly tested and updated to ensure effectiveness.
AWS provides various services like AWS Backup...read more
Q99. How to write the step execution report/result in the report?
Use TestNG or JUnit framework to generate step execution report/result.
Use TestNG or JUnit annotations to mark the start and end of each test step.
Use TestNG or JUnit listeners to capture the test results and generate the report.
Use reporting libraries like ExtentReports or ReportNG to generate detailed reports with screenshots and logs.
Q100. What else do you do apart from programming and studies
Apart from programming and studies, I enjoy playing sports, reading books, and volunteering.
Playing sports: I am an avid basketball player and participate in local leagues.
Reading books: I love reading fiction novels and self-help books to expand my knowledge.
Volunteering: I actively volunteer at a local animal shelter, helping with animal care and adoption events.
Top HR Questions asked in Al Sharq Flexible Packaging Factories
Interview Process at Al Sharq Flexible Packaging Factories
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month