Wipro
2500+ BENGAL BUILDING SOLUTIONS Interview Questions and Answers
Q101. What are the steps involved in program execution? When is the memory allocated to the program variables?
Program execution involves several steps, including compilation, linking, loading, and execution. Memory is allocated to program variables during runtime.
Compilation: Source code is translated into machine code or bytecode.
Linking: Object files and libraries are combined to create an executable file.
Loading: The executable file is loaded into memory.
Execution: The program instructions are executed by the CPU.
Memory Allocation: Memory is allocated to program variables during r...read more
Q102. What is the difference between impact and urgency?
Impact refers to the extent of the consequences caused by an incident, while urgency refers to the time sensitivity of resolving the incident.
Impact is about the severity and extent of the damage caused by an incident.
Urgency is about the time sensitivity and the need for immediate action to resolve the incident.
Impact is measured in terms of the disruption caused to the business or services.
Urgency is measured in terms of the time constraints and the impact on business opera...read more
Q103. If we have a input file with one record and lookup file with 5 records and input record matches with all 5 records in lookup file. How many records will you get in output
The output will have 5 records.
The input record matches with all 5 records in the lookup file.
Each match will result in a separate record in the output.
Therefore, the output will have 5 records.
Q104. Write the code:- count number of characters and alphabets in string.
Code to count number of characters and alphabets in a string.
Use the len() function to count the total number of characters in the string.
Use isalpha() function to check if a character is an alphabet or not.
Loop through each character in the string and increment the count of alphabets if it is an alphabet.
Return the total count of characters and alphabets in the string.
Q105. What will you do if your system is infected with the malware and how will you backup
If infected with malware, isolate system, run antivirus scan, remove malware, backup data to external device.
Isolate infected system from network to prevent further spread of malware
Run antivirus scan to detect and remove malware
If antivirus scan fails, use malware removal tools or seek professional help
Backup important data to external device before attempting any fixes
Ensure backup device is not infected with malware before restoring data
Q106. Tell me about OOPS concepts in python.
OOPS concepts in Python include inheritance, encapsulation, polymorphism, and abstraction.
Inheritance allows a class to inherit properties and methods from a parent class.
Encapsulation refers to the practice of hiding implementation details from the user.
Polymorphism allows objects to take on multiple forms or behaviors.
Abstraction involves creating a simplified representation of complex real-world objects.
Python supports all four OOPS concepts and allows for easy implementat...read more
Q107. 19c upgradation steps Challanges faced during upgradation. Dataguard configuration Opatch rollback steps. RMAN duplication
Upgrading to Oracle Database 19c and related challenges
Ensure compatibility of existing applications with 19c
Perform pre-upgrade tasks such as backup and patching
Upgrade the database using DBUA or manual methods
Address challenges such as deprecated features and changes in behavior
Configure Data Guard for high availability and disaster recovery
Rollback an OPatch using the -rollback option
Use RMAN duplication to create a copy of the database for testing or reporting
Q108. What is class? what is an operating system? what do you know about the OSI model? what is difference between compilers and interpreters? what do you know about SDLC?
A class is a blueprint for creating objects in object-oriented programming.
A class defines the properties and behaviors of an object.
It serves as a template for creating multiple instances of objects.
Objects are instances of a class.
Classes can have attributes (variables) and methods (functions).
Q109. How to achieve parallel testing in selenium using Java?
Achieve parallel testing in Selenium using Java
Use TestNG framework to execute tests in parallel
Create multiple instances of WebDriver
Use ThreadLocal to maintain thread safety
Use Selenium Grid to distribute tests across multiple machines
Configure TestNG XML file to specify parallel execution mode
Q110. What is your experience with database management systems?
I have extensive experience with database management systems.
Proficient in SQL and NoSQL databases
Designed and implemented database schemas
Optimized database performance through indexing and query optimization
Experience with MySQL, MongoDB, and PostgreSQL
Familiarity with data warehousing and ETL processes
Q111. What do you know about insurance?
Insurance is a contract between an individual and an insurance company, providing financial protection against potential losses.
Insurance is a form of risk management.
It involves the transfer of risk from an individual to an insurance company.
Insurance policies provide financial compensation in case of specified events or losses.
Types of insurance include life, health, property, auto, and liability insurance.
Premiums are paid by the insured to the insurance company in exchang...read more
Q112. differences between credit card and debit card
Credit cards allow borrowing money while debit cards use funds from a linked account.
Credit cards charge interest on unpaid balances while debit cards do not.
Credit cards offer rewards and cashback while debit cards do not.
Credit cards have a credit limit while debit cards do not.
Credit cards can be used to build credit history while debit cards cannot.
Examples of credit cards include Visa, Mastercard, and American Express while examples of debit cards include Visa Debit, Mas...read more
Q113. In a page there are two login button available, So will it have same ID?
No, the two login buttons should not have the same ID.
IDs should be unique for each element on a page
Having two elements with the same ID can cause issues with locating and interacting with the elements
Q114. Write a program for the Fibonacci series up to nth term.
Program to generate Fibonacci series up to nth term.
Declare variables for first and second terms of the series
Use a loop to generate the series up to nth term
Print the series as output
Q115. Can you explain real-life examples of where OOPs concepts?
OOPs concepts are used in various real-life scenarios such as software development, game development, and automation.
In software development, OOPs concepts are used to create reusable code and improve code organization.
In game development, OOPs concepts are used to create game objects with properties and behaviors.
In automation, OOPs concepts are used to create modular and scalable code for testing and scripting.
Q116. Can you define AI in terms of security with suitable examples. And with a solution approach. Is AI a threat? Elaborate. What libraries of Python can be used so for security purposes?
AI in security involves using machine learning algorithms to detect and prevent cyber threats.
AI can analyze large amounts of data to identify patterns and anomalies that may indicate a security breach.
Examples include using AI to detect malware, phishing attacks, and network intrusions.
AI can also be used to automate threat response and enhance incident response capabilities.
Python libraries like TensorFlow, Keras, and Scikit-learn can be used for building AI-based security ...read more
Q117. Difference between singly linked list and doubly linked list , OOP concepts , Prime number logic ,Armstrong number logic
Explaining the difference between singly and doubly linked lists and discussing OOP concepts, prime number and Armstrong number logic.
Singly linked list has one pointer to the next node while doubly linked list has two pointers to the next and previous nodes.
OOP concepts include encapsulation, inheritance, and polymorphism.
Prime number logic involves checking if a number is only divisible by 1 and itself.
Armstrong number logic involves checking if a number is equal to the sum...read more
Q118. What experience do you have working with technologies like Javascript , Html , CSS , NodeJs ?
I have extensive experience working with Javascript, HTML, CSS, and NodeJs in various projects.
Developed interactive web applications using Javascript, HTML, and CSS
Utilized NodeJs for server-side development and building APIs
Implemented responsive design techniques with CSS frameworks like Bootstrap
Integrated front-end and back-end technologies to create seamless user experiences
Q119. How to populate manager using Server side code
To populate manager using server-side code, you can query the user table and retrieve the manager's details based on the user's ID.
Use GlideRecord to query the user table
Retrieve the manager's details using the user's ID
Set the manager field with the retrieved manager's details
Q120. What all authentication measures did you take in your projects?
I implemented multiple authentication measures in my projects to ensure secure access.
Implemented password-based authentication with strong password policies
Utilized two-factor authentication for an added layer of security
Implemented biometric authentication using fingerprint or facial recognition
Used multi-factor authentication to combine multiple authentication methods
Implemented single sign-on (SSO) for seamless and secure access across multiple systems
Implemented role-bas...read more
Q121. Os installed and networking , what is hardware
Hardware refers to the physical components of a computer system, such as the motherboard, CPU, RAM, and hard drive.
Hardware is the physical components that make up a computer system
Examples of hardware include the motherboard, CPU, RAM, hard drive, and network interface card
Hardware is essential for a computer system to function properly
Hardware can be upgraded or replaced to improve performance or fix issues
Q122. What is the Lifecycle of MIM
The lifecycle of Major Incident Manager (MIM) involves several stages from identification to resolution.
Identification of major incidents
Logging and categorizing incidents
Assigning resources and forming an incident management team
Investigation and analysis of incidents
Implementing temporary workarounds or fixes
Communicating with stakeholders and providing updates
Resolving the incident and restoring normal service
Conducting post-incident reviews and documenting lessons learned
Q123. If we give you different domain rather then your preferred domain will you work on it ?
Yes, I am open to working on different domains as it will broaden my knowledge and skills.
I am always eager to learn new things and take on new challenges.
Working on a different domain will give me the opportunity to expand my knowledge and skills.
I am confident that I can adapt quickly and efficiently to a new domain.
Examples: If I have experience in software engineering and I am asked to work on a networking project, I will be willing to learn and work on it.
Examples: If I ...read more
Q124. 5) what all db activities can be part of transaction group ?
DB activities that can be part of a transaction group
Insertion of data into a table
Updating data in a table
Deletion of data from a table
Creating or dropping a table
Altering the structure of a table
Executing stored procedures
Executing functions
Executing triggers
Q125. Explain the Order to Cash Flow ? How you book the order ? How you Invoice the order ? Scenario Based Question about If customer reject the invoice, what's the next step ?
Order to Cash Flow involves booking orders, invoicing customers, and handling rejections.
Booking the order involves capturing customer details, product/service details, quantity, pricing, and delivery terms.
Invoicing the order includes generating an invoice with all relevant details, such as customer name, order details, pricing, and payment terms.
If a customer rejects the invoice, the next step is to investigate the reason for rejection, address any issues, and reissue the i...read more
Q126. What is Testing? And why we use testing? What bugs do you find in website? Share your toughest experience of solving a bug and what functions did you used while solving it?
Testing is the process of evaluating a system or component to find defects and ensure its quality.
Testing is done to identify defects or bugs in a system or component.
It helps in ensuring the quality and reliability of the software.
Testing involves executing test cases and comparing the actual results with expected results.
Different types of testing include functional testing, performance testing, security testing, etc.
Bugs commonly found in websites include broken links, inc...read more
Q127. return index of the elements whose sum is equal to given sum in an array
Return index of elements whose sum is equal to given sum in an array.
Iterate through the array and check if the sum of any two elements is equal to the given sum.
If yes, return the indices of those two elements.
If no such pair exists, return an empty array.
Q128. Do you have any technical certifications? How many programming languages do you know? What are the different types of OS you are comfortable working with? What is the extent of your technical expertise? How man...
read moreI have technical certifications and experience with multiple OS and development tools.
I have a certification in CompTIA A+ and am working towards my Network+ certification.
I am proficient in Java, Python, and C++.
I am comfortable working with Windows, MacOS, and Linux operating systems.
My technical expertise includes troubleshooting hardware and software issues, network connectivity, and system administration.
I have used development tools such as Eclipse, Visual Studio, and G...read more
Q129. Tell me about your college? What are the advantages of autonomous College?
Autonomous colleges are independent and have more academic freedom.
Autonomous colleges have the freedom to design their own courses and syllabus.
They can also conduct their own exams and evaluate students.
This allows for more flexibility and innovation in teaching methods.
Autonomous colleges are also able to respond more quickly to changes in the industry and job market.
Examples of autonomous colleges include Indian Institute of Technology (IIT) and Indian Institute of Manage...read more
Q130. what is the difference between class and objects?
A class is a blueprint for creating objects, while an object is an instance of a class.
A class defines the properties and methods that objects of that class will have.
An object is created from a class and has its own unique set of values for the properties defined in the class.
Multiple objects can be created from the same class.
Classes can inherit properties and methods from other classes.
Example: A class 'Car' can have properties like 'make', 'model', and 'year', while an ob...read more
Q131. What is the use of stack memory, data memory and program memory?
Stack, data and program memory are used in software engineering for storing and managing data and instructions.
Stack memory is used for storing local variables and function calls.
Data memory is used for storing global and static variables.
Program memory is used for storing the executable code of the program.
Examples of stack memory usage include recursion and function calls.
Examples of data memory usage include global variables and constants.
Examples of program memory usage i...read more
Q132. What is the difference between C and C++?
C++ is an extension of C with object-oriented programming features.
C++ supports classes and objects while C does not.
C++ has better support for polymorphism and inheritance.
C++ has a standard template library (STL) which provides useful data structures and algorithms.
C++ is more complex than C and requires more knowledge to use effectively.
Q133. What is durability in acid properties
Durability in acid properties refers to the ability of a material to withstand the corrosive effects of acid.
Durability is important in industries that use acids, such as chemical manufacturing and mining.
Materials with high durability in acid properties include stainless steel and certain types of plastics.
Durability can be measured through tests such as the ASTM G31 standard.
Factors that affect durability include concentration and temperature of the acid, as well as the mat...read more
Q134. Who will you escalate first when a client reports an incident?
I will escalate the incident to the project manager first.
Escalate the incident to the project manager for immediate action.
Project manager can assess the severity of the incident and coordinate with the client.
If necessary, involve higher management or relevant stakeholders based on the project's escalation process.
Q135. what is NAT gateway and where it is used.
NAT gateway is a managed service that allows instances in a private subnet to connect to the internet.
NAT gateway acts as a gateway for instances in a private subnet to access the internet.
It provides a public IP address to instances in the private subnet.
It helps in controlling the inbound and outbound traffic for instances in the private subnet.
It is used in scenarios where instances in a private subnet need to access the internet but do not have a public IP address.
It is a...read more
Q136. How do you define Digital Transformation strategy for a client ?
Digital Transformation strategy for a client involves identifying areas of improvement and implementing technology solutions to enhance business operations.
Understand the client's business goals and objectives
Identify areas of improvement and pain points
Evaluate existing technology infrastructure
Develop a roadmap for implementing new technology solutions
Ensure alignment with business strategy and goals
Provide training and support for employees
Continuously monitor and evaluate...read more
Q137. What do you know about Wipro?
Wipro is an Indian multinational corporation that provides information technology, consulting and business process services.
Founded in 1945 by M.H. Hasham Premji
Headquartered in Bangalore, India
Employs over 190,000 people worldwide
Provides services in various industries including healthcare, finance, and retail
Has partnerships with major technology companies such as Microsoft and SAP
Q138. What is static and dynamic memory allocation?
Static memory allocation is done at compile-time, while dynamic memory allocation is done at runtime.
Static memory allocation is used for variables that are fixed in size and do not change during program execution.
Dynamic memory allocation is used for variables that can change in size during program execution.
Static memory allocation is faster than dynamic memory allocation.
Dynamic memory allocation is useful when the size of the data is not known at compile-time.
Examples of ...read more
Q139. What are noises in data set and how to classify data for the training of model
Noises in data set are irrelevant or erroneous data. Data classification is done based on features and labels.
Noises are irrelevant or erroneous data that can affect the accuracy of the model
Data classification is done based on features and labels
Features are the input variables and labels are the output variables
Data can be classified as categorical or numerical
Categorical data can be further classified as nominal or ordinal
Numerical data can be further classified as discret...read more
Q140. What is Google mapping
Google Maps is a web mapping service developed by Google. It offers satellite imagery, street maps, 360° panoramic views of streets, real-time traffic conditions, and route planning.
Provides detailed maps and satellite imagery of locations worldwide
Offers real-time traffic updates and route planning
Includes 360° panoramic views of streets
Can be used for navigation and exploring new places
Has features like Street View, indoor maps, and local business information
Q141. what is oops. explain pillars of oops. Why we need oops in programming?
OOPs stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.
Pillars of OOPs: Inheritance, Encapsulation, Polymorphism, Abstraction
Inheritance: Allows a class to inherit properties and behavior from another class
Encapsulation: Bundling of data with the methods that operate on that data
Polymorphism: Ability to present the same interface for different da...read more
Q142. What are the OOPS concepts? Give an real life example of polymorphism.
OOPS concepts are fundamental principles of object-oriented programming. Polymorphism allows objects to be treated as instances of their parent class.
OOPS concepts include inheritance, encapsulation, polymorphism, and abstraction.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
Example: In a real life scenario, a parent class 'Vehicle' can have subclasses like 'Car' and 'Truck'. Both Car and Truck can have a method 'drive()', bu...read more
Q143. Tell me about your self What is inheritance What is polymorphism What is function overloading&Overridden How to select data from table
Technical questions related to software engineering
Inheritance is a mechanism in OOP where a class inherits properties and methods from another class
Polymorphism is the ability of an object to take on multiple forms
Function overloading is when multiple functions have the same name but different parameters
Function overriding is when a subclass provides a different implementation of a method that is already defined in its superclass
To select data from a table, use SQL SELECT st...read more
Q144. What version of SNOW Do we use?
We use version X of SNOW.
The current version of SNOW we use is X.
We upgraded to version X last year.
All incidents are logged in SNOW version X.
Q145. What are the key factors that need to be in place while creating a client solution?
Key factors for creating a client solution
Understanding client's needs and goals
Identifying potential challenges and limitations
Developing a customized solution
Ensuring scalability and flexibility
Providing ongoing support and maintenance
Collaborating with the client throughout the process
Q146. 8.Can we differ an OS update for an iOS device using an MDM solution? If yes, how can we do so?
Yes, we can differ an OS update for an iOS device using an MDM solution.
MDM solution allows administrators to control the update process
Administrators can choose to delay or skip updates for certain devices
This can be done by creating update policies and assigning them to specific devices or groups
For example, an organization may choose to delay updates for a few days to ensure compatibility with their internal apps
MDM solutions like Jamf, Microsoft Intune, and VMware Workspa...read more
Q147. What is constructor and method overloading overriding what is constructor overloading
Constructor and method overloading and overriding are concepts in object-oriented programming.
Constructor overloading is when a class has multiple constructors with different parameters.
Method overloading is when a class has multiple methods with the same name but different parameters.
Method overriding is when a subclass provides its own implementation of a method that is already defined in its superclass.
Constructor overloading is used to create objects with different initia...read more
Q148. return the difference between maximum and minimum number’s count in an array.
Return the difference between maximum and minimum number's count in an array of strings.
Convert the array of strings to an array of integers
Use Math.max() and Math.min() to find the maximum and minimum numbers in the array
Count the occurrences of the maximum and minimum numbers using a loop
Return the difference between the counts
Q149. Write a code to print the difference of a number and reverse that number
Code to print the difference of a number and its reverse
Convert the number to string
Reverse the string
Convert the reversed string back to number
Subtract the original number from the reversed number
Print the result
Q150. Do you know what it is like to work in a plant?
Yes, I have experience working in a plant.
Working in a plant involves managing and overseeing various engineering projects.
It requires knowledge of plant operations, equipment, and processes.
Plant engineers are responsible for ensuring the efficiency and safety of plant operations.
They collaborate with different teams, such as maintenance, production, and quality control.
Examples of plant engineering projects include designing and implementing new production lines, optimizing...read more
Q151. What is the ranges of the private ip addresses
Private IP addresses ranges are reserved for internal networks and not routable on the internet.
Private IP addresses are used within a local network and are not accessible from the internet
There are three ranges of private IP addresses: 10.0.0.0 - 10.255.255.255, 172.16.0.0 - 172.31.255.255, and 192.168.0.0 - 192.168.255.255
Private IP addresses are commonly used in home and office networks to allow devices to communicate with each other
Q152. What is Singleton pattern and how to implement it?
Singleton pattern restricts the instantiation of a class to one object.
Create a private constructor to restrict object creation.
Create a static method to return the single instance of the class.
Use lazy initialization to create the instance only when needed.
Ensure thread safety by using synchronized keyword or double-checked locking.
Commonly used in database connections, logging, and configuration settings.
Q153. I had to write an Essay on 'Is social media a necessary evil."
Social media is a necessary evil as it has both positive and negative impacts on society.
Social media has revolutionized communication and made it easier to connect with people.
It has also provided a platform for businesses to reach a wider audience and for individuals to showcase their talents.
However, social media has also been linked to mental health issues such as anxiety and depression.
It has also been criticized for spreading fake news and misinformation.
Overall, social...read more
Q154. How many databases you are familiar with except MySQL?
I am familiar with several databases other than MySQL.
I have experience with PostgreSQL, Oracle, MongoDB, and Microsoft SQL Server.
I am also familiar with NoSQL databases such as Cassandra and Couchbase.
I have worked with various cloud-based databases like Amazon RDS and Google Cloud SQL.
Q155. What type of source of electrical energy ,what is MCB and why use MCB ,and process of electrical energy generation to consumers
MCB is a type of source of electrical energy used for protection against overload and short circuit.
MCB stands for Miniature Circuit Breaker.
It is a device that automatically switches off the electrical circuit during abnormal conditions such as overload or short circuit.
MCBs are commonly used in residential, commercial, and industrial electrical installations.
They provide protection to electrical equipment and prevent damage or fire hazards.
MCBs are more reliable and faster ...read more
Q156. Do you have interest in Data science, what related projects have you done previously?
Yes, I have a strong interest in data science. I have worked on projects involving predictive analytics and machine learning.
Developed a predictive maintenance model for manufacturing equipment
Implemented a machine learning algorithm to optimize supply chain logistics
Utilized data visualization techniques to identify trends and patterns in customer behavior
Q157. what is EC2 ? why you used it ? How you build and deploy on AWS ?
EC2 is a web service that provides resizable compute capacity in the cloud.
EC2 stands for Elastic Compute Cloud
It allows users to rent virtual computers on which to run their own applications
EC2 instances can be easily scaled up or down based on demand
To build and deploy on AWS, one can use services like AWS CodeDeploy, AWS CodePipeline, and AWS Elastic Beanstalk
Q158. What all colours what they indecate
Colors on Google Maps indicate different types of locations and features.
Blue: water bodies
Green: parks and forests
Yellow: areas of interest
Orange: shopping areas
Red: traffic congestion
Gray: areas with limited Street View coverage
Q159. 12-whta is in bound and out bound callings?
Inbound and outbound callings refer to different types of phone calls made by individuals or organizations.
Inbound calling involves receiving incoming calls from customers or clients.
Outbound calling involves making outgoing calls to customers or clients.
Inbound calls are typically related to customer service, support, or inquiries.
Outbound calls are often made for sales, marketing, or follow-up purposes.
Examples of inbound calling include answering customer queries or provid...read more
Q160. How much time you will take to handle a query or a ticket?
The time taken to handle a query or ticket depends on various factors such as complexity, resources available, and priority.
The time taken can vary from a few minutes to several hours or even days.
Simple queries or tickets that require basic troubleshooting can be resolved quickly.
Complex issues that require in-depth analysis or involvement of multiple teams may take longer to resolve.
The availability of resources, such as skilled technicians or necessary equipment, can impac...read more
Q161. What is diff between CTE , Temp table and Table variable
CTE, Temp table and Table variable are used to store temporary data in SQL Server.
CTE (Common Table Expression) is a temporary named result set that can be referenced within a SELECT, INSERT, UPDATE, or DELETE statement.
Temp table is a physical table that is created in the tempdb database and can be used to store temporary data.
Table variable is a variable that can store a result set for later use and is similar to a temp table but is stored in memory.
CTE is useful for recurs...read more
Q162. What is the programming language of your interest?
My programming language of interest is Python.
Python is a versatile language used in web development, data analysis, machine learning, and more.
It has a simple syntax and is easy to learn for beginners.
Python has a large community and a vast library of modules and frameworks.
Examples of Python-based frameworks include Django, Flask, and PyTorch.
Q163. Can we have multiple inheritance in java?
No, Java doesn't support multiple inheritance.
Java only supports single inheritance through classes and interfaces.
However, interfaces can be implemented multiple times.
To achieve multiple inheritance-like behavior, composition can be used.
Q164. How many words per minute are you able to type?
I am able to type 80 words per minute.
I have a typing speed of 80 words per minute.
I am proficient in touch typing and can accurately type at a fast pace.
My typing speed allows me to efficiently complete tasks that require extensive typing, such as data entry or transcription.
I have consistently maintained a high typing speed throughout my career.
I am confident in my ability to meet deadlines and handle large volumes of typing work.
Q165. How to start spring boot application even though a class having error
To start Spring Boot app with class error, disable strict classpath checking.
Add 'spring.main.lazy-initialization=true' to application.properties.
Disable strict classpath checking by adding 'spring.main.allow-bean-definition-overriding=true'.
Use 'spring.main.banner-mode=off' to disable banner.
Use 'spring.main.web-environment=false' to disable web environment.
Use 'spring.main.headless=true' to enable headless mode.
Q166. What do you mean by deadlock in OS?
Deadlock is a situation in which two or more processes are unable to proceed because each is waiting for the other to release a resource.
Deadlock occurs when two or more processes are stuck in a circular waiting state.
It happens when processes compete for resources and each process holds a resource that another process needs.
Four necessary conditions for deadlock are mutual exclusion, hold and wait, no preemption, and circular wait.
Examples of deadlock include the dining phil...read more
Q167. Which concepts you know about java
I know about object-oriented programming, data types, control structures, exception handling, and collections in Java.
Object-oriented programming concepts like inheritance, polymorphism, and encapsulation
Data types including primitive types, arrays, and strings
Control structures like if-else statements, loops, and switch statements
Exception handling using try-catch blocks
Collections like ArrayList, HashMap, and LinkedList
Java frameworks like Spring and Hibernate
Q168. What is foreign key in dbms
A foreign key is a column or set of columns in a database table that refers to the primary key of another table.
A foreign key ensures referential integrity between two tables.
It is used to establish a relationship between two tables.
It helps in maintaining data consistency and accuracy.
For example, a customer table may have a foreign key that refers to the primary key of an orders table.
Q169. Should “Social Media” technique be used for educational purposes
Yes, social media can be used for educational purposes.
Social media provides a platform for sharing educational content and resources.
It allows for collaboration and communication among students and teachers.
Social media can enhance learning through interactive discussions and real-time feedback.
It can also help in reaching a wider audience and promoting educational initiatives.
Examples include educational YouTube channels, online courses on platforms like Coursera, and educa...read more
Q170. List is an interface or a class in java collection?
List is an interface in java collection.
List is a part of the Java Collection Framework.
It is an ordered collection of elements.
It allows duplicate elements and null values.
Some common implementations of List are ArrayList, LinkedList, and Vector.
Q171. Explain about Adapter Design pattern ? Why you have used it and explain in depth ? Is it possible to replace it ?
Adapter pattern converts the interface of a class into another interface that clients expect.
Adapter pattern is used to make incompatible interfaces work together.
It is used when we want to reuse an existing class that doesn't have the interface we need.
It involves creating a wrapper class that translates the interface of one class into another interface.
An example is using a USB to Ethernet adapter to connect a computer to a network.
It is possible to replace it with other pa...read more
Q172. Give me the real example of equivalence partitioning?
Equivalence partitioning is a technique used in software testing to divide input data into groups that are expected to exhibit similar behavior.
Dividing input data into groups that are expected to behave similarly
Testing only one input from each group
Examples: age groups, income brackets, product categories
Q173. How to check uptime of Routers & Switches
To check uptime of Routers & Switches, use the show version command.
Log in to the device using SSH or Telnet.
Enter the show version command.
Look for the line that starts with 'uptime'.
The uptime will be displayed in the format of days, hours, minutes, and seconds.
Alternatively, you can use network monitoring tools like Nagios, PRTG, or SolarWinds to monitor uptime.
These tools can provide alerts when a device goes down or when uptime falls below a certain threshold.
Joins in database management systems are used to combine rows from two or more tables based on a related column between them.
Joins are used to retrieve data from multiple tables based on a related column.
Common types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN.
INNER JOIN returns rows when there is at least one match in both tables.
LEFT JOIN returns all rows from the left table and the matched rows from the right table.
RIGHT JOIN returns all rows from the...read more
Multitasking refers to the ability to perform multiple tasks simultaneously or switch between tasks quickly.
Multitasking involves dividing your attention and focus between different tasks at the same time.
It can be achieved by efficiently managing time, prioritizing tasks, and staying organized.
Examples include checking emails while on a conference call, or listening to music while working on a project.
Q176. Why do we need OOPs?
OOPs is needed for better code organization, reusability, and maintainability.
OOPs allows for code organization by breaking down complex systems into smaller, manageable objects.
It promotes reusability by allowing objects to be used in different parts of the codebase.
Inheritance and polymorphism in OOPs enable code reuse and reduce redundancy.
Encapsulation in OOPs protects data and provides a clear interface for interacting with objects.
OOPs facilitates maintainability by mak...read more
Q177. What is pop and imap and smtp and all protocol port number
POP, IMAP, and SMTP are email protocols used for sending and receiving emails. Each protocol uses different port numbers.
POP (Post Office Protocol) is used for downloading emails from a server to a client. It uses port number 110.
IMAP (Internet Message Access Protocol) is used for accessing emails on a server from a client. It uses port number 143.
SMTP (Simple Mail Transfer Protocol) is used for sending emails from a client to a server. It uses port number 25.
Secure versions ...read more
Q178. What are the conditions of Deadlock? How it can be avoided?
Deadlock occurs when two or more processes are blocked, waiting for each other to release resources.
Conditions for deadlock are mutual exclusion, hold and wait, no preemption, and circular wait.
Deadlock can be avoided by using techniques such as resource allocation graph, banker's algorithm, and deadlock detection and recovery.
Resource allocation graph is a directed graph that shows the allocation and request of resources by processes.
Banker's algorithm is a resource allocati...read more
Q179. What is a DNS DHCP networking troubleshoot active directory
DNS, DHCP, networking, troubleshooting, and Active Directory are all related to managing and troubleshooting network services and infrastructure.
DNS (Domain Name System) is responsible for translating domain names into IP addresses.
DHCP (Dynamic Host Configuration Protocol) is used to automatically assign IP addresses to devices on a network.
Networking involves the design, implementation, and management of computer networks.
Troubleshooting is the process of identifying and re...read more
Q180. Why do we considering 60% for IRA assets, 70% for stocks and Large deposit definition
Assets are considered differently based on their liquidity and volatility.
IRA assets are considered less liquid and more stable, hence 60% is considered
Stocks are more volatile and hence only 70% is considered
Large deposit definition varies based on the bank's policy
This approach helps in assessing the risk associated with different types of assets
Q181. What is fraud and different ways on how we can try to stop it
Fraud is a deliberate deception for personal gain. It can be stopped by implementing fraud prevention measures.
Fraud can occur in various forms such as identity theft, credit card fraud, insurance fraud, etc.
To prevent fraud, companies can implement measures such as background checks, fraud detection software, and employee training.
Consumers can protect themselves by being cautious of suspicious emails, phone calls, and websites, and regularly monitoring their financial accou...read more
Q182. which language is faster python or java and why do you say that
Java is generally faster than Python due to its compiled nature and optimized execution.
Java is a compiled language, while Python is an interpreted language.
Java code is converted into bytecode and then executed by the Java Virtual Machine (JVM), which allows for faster execution.
Python code is interpreted line by line, resulting in slower execution compared to Java.
Java has better performance for computationally intensive tasks and large-scale applications.
Python, on the oth...read more
Q183. How to stag a server in VM and physical environment.
Staging a server in VM and physical environment
Create a VM with the same specifications as the physical server
Install the same operating system and software on both the VM and physical server
Configure the VM to mimic the network settings of the physical server
Test the applications and services on the VM before deploying to the physical server
Ensure that the VM and physical server have the same hardware and software configurations
Use tools like VMware vSphere or Microsoft Hype...read more
Q184. what is polymorphism?
Polymorphism is the ability of an object to take on many forms.
Polymorphism allows objects of different classes to be treated as if they are of the same class.
It is achieved through method overriding and method overloading.
Example: A parent class Animal can have child classes like Dog, Cat, and Bird. Each child class can have its own implementation of the method 'makeSound', but they can all be called using the same method name.
Polymorphism makes code more flexible and reusab...read more
Q185. What is the full form of OOPS? What is a class? What is an object? List the types of inheritance supported in C++. What is the role of protected access specifier? What is encapsulation? What is abstraction? Wha...
read moreOOPS stands for Object-Oriented Programming System. It is a programming paradigm based on the concept of objects.
A class is a blueprint or template for creating objects that defines its properties and methods.
An object is an instance of a class that has its own state and behavior.
C++ supports single, multiple, and multilevel inheritance.
The protected access specifier allows access to the member variables and functions within the class and its derived classes.
Encapsulation is ...read more
Q186. What is a shallow copy and deep copy?
Shallow copy and deep copy are two ways of copying objects in programming.
Shallow copy creates a new object but references the same memory location as the original object.
Deep copy creates a new object and allocates new memory for it, copying the values of the original object.
Shallow copy is faster and uses less memory, but changes to the original object affect the copied object.
Deep copy is slower and uses more memory, but changes to the original object do not affect the cop...read more
Q187. Give an example of data abstraction.
Data abstraction is the process of hiding complex implementation details and providing a simplified interface.
Abstraction allows users to interact with complex systems without needing to understand the underlying complexity.
An example of data abstraction is using a smartphone. Users can make calls, send messages, and use apps without knowing the intricate details of how the device works.
Another example is a car dashboard. It provides essential information like speed, fuel lev...read more
Q188. What are the risks associated with payroll industry.
The risks associated with the payroll industry include compliance issues, data security breaches, and errors in processing.
Compliance issues: Payroll regulations and tax laws are constantly changing, and non-compliance can result in penalties and legal consequences.
Data security breaches: Payroll systems contain sensitive employee information, making them a target for hackers and identity theft.
Processing errors: Mistakes in payroll calculations or payments can lead to financ...read more
Q189. how do you connect data bricks with storage account
To connect data bricks with storage account, you need to create a storage account and configure it in the data bricks workspace.
Create a storage account in Azure portal
Get the connection string of the storage account
In the data bricks workspace, go to 'Storage' and click on 'Create'
Select the storage account type and provide the connection string
Test the connection and save the configuration
Q190. How will you retrieve all the values from the drop down?
To retrieve all values from a drop down, we can use the getOptions() method and store the values in an array of strings.
Locate the drop down element using any of the locators
Create a Select class object by passing the drop down element as a parameter
Use the getOptions() method to retrieve all the options from the drop down
Store the options in an array of strings
Q191. Please explain the P2P Cycle ?
The P2P Cycle refers to the end-to-end process of purchasing goods or services, from requisition to payment.
The cycle starts with a purchase requisition, where a request is made for goods or services.
The requisition is then approved by the appropriate authority.
A purchase order is created based on the approved requisition, specifying the details of the purchase.
The purchase order is sent to the supplier or vendor.
Upon receiving the goods or services, the receiving department ...read more
Q192. 1. Use of Apache Spark - Dataframe, Datasets and RDD. 2. Transformations and Actions in Spark. 3. Optimization in Spark 4. HIVE - Dynamic and Static Partitioning. 5. HIVE - Partitioning and Bucketing. 6. SQL -...
read moreQuestions related to Apache Spark, HIVE, and SQL.
Apache Spark is a distributed computing framework used for big data processing.
Dataframe, Datasets, and RDD are the core abstractions in Spark.
Transformations and Actions are the two types of operations in Spark.
Optimization techniques like caching, partitioning, and broadcasting can improve Spark performance.
HIVE is a data warehousing tool that uses SQL-like syntax to query data stored in Hadoop.
Dynamic and Static Partitioning...read more
Q193. How the screenshot is taken and what is the use of it
Screenshots are captured images of the current screen. They are used for documentation, troubleshooting, and sharing information.
Screenshots can be taken using built-in tools like Snipping Tool or keyboard shortcuts like Print Screen.
Screenshots can be used to document software bugs or errors for troubleshooting purposes.
Screenshots can be shared with others to provide visual information or instructions.
Screenshots can be used for training or educational purposes.
Screenshots ...read more
The solution to the automata coding question involves designing a finite state machine to recognize a specific pattern or language.
Understand the requirements of the automata problem and define the states, transitions, and final states.
Implement the finite state machine using a programming language like Python or C++.
Test the automata with different inputs to ensure it correctly recognizes the desired pattern.
Optimize the automata design for efficiency if needed.
Example: Desi...read more
Q195. what is the importance of polymorphism?
Polymorphism allows objects of different classes to be treated as if they were of the same class.
Polymorphism enables code reuse and flexibility in object-oriented programming.
It allows for the creation of generic code that can work with objects of different classes.
Examples include method overloading and overriding, and interfaces in Java.
Polymorphism can improve code readability and maintainability.
It is a key concept in inheritance and abstraction.
Q196. Differences between OOP and Functional Orientated Program.
OOP focuses on objects and their interactions, while functional programming emphasizes on functions and their behavior.
OOP uses classes and objects to encapsulate data and behavior, while functional programming uses pure functions.
In OOP, objects have state and behavior, while in functional programming, functions have no side effects.
OOP emphasizes on inheritance and polymorphism, while functional programming emphasizes on higher-order functions and recursion.
Examples of OOP ...read more
Q197. 5. What do you know about java programming language
Java is a popular object-oriented programming language used for developing various applications.
Java is platform-independent and can run on any operating system
It is used for developing web, mobile, and desktop applications
Java is known for its security features and is widely used in enterprise applications
It follows the OOPs concept and supports multithreading
Some popular Java frameworks include Spring, Hibernate, and Struts
Q198. What is c language? When c language developed
C language is a high-level programming language used for system programming and application development.
Developed by Dennis Ritchie at Bell Labs in 1972
Used for developing operating systems, compilers, and embedded systems
Influenced the development of many other programming languages such as C++, Java, and Python
Q199. 1.What is DR and how you handle it.
DR stands for Disaster Recovery. It involves implementing strategies and procedures to ensure business continuity in the event of a disaster.
DR is the process of preparing for and recovering from a disaster that affects the availability of IT infrastructure and services.
It includes creating backup systems, replicating data, and establishing failover mechanisms.
DR plans should be regularly tested and updated to ensure effectiveness.
AWS provides various services like AWS Backup...read more
Q200. What is besic concept in account
The basic concept in accounting is the double-entry system, which involves recording every transaction in two accounts: debit and credit.
Double-entry system is the foundation of accounting
Every transaction is recorded in two accounts: debit and credit
Debit refers to the left side of an account and credit refers to the right side
Debit and credit must always balance
Examples: recording a sale, paying rent, receiving payment from a customer
Top HR Questions asked in BENGAL BUILDING SOLUTIONS
Interview Process at BENGAL BUILDING SOLUTIONS
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month