Wolters Kluwer
50+ C-Edge Technologies Interview Questions and Answers
You are given two water jugs with capacities X and Y litres respectively. Both the jugs are initially empty. There is an infinite amount of water supply available. The jugs do not have markings...read more
The problem is to determine whether it is possible to measure a specific amount of water using two jugs with given capacities.
The jugs can be filled, emptied, and water can be poured from one jug to another.
If the target measure is achievable, there must be exactly Z liters of water in one or both jugs.
We can solve this problem using the concept of the greatest common divisor (GCD) of the jug capacities.
If Z is divisible by the GCD of X and Y, then it is possible to measure Z...read more
You are given a 2D matrix ‘ARR’ of size ‘N x 3’ having integers, where ‘N’ is the number of rows.
Your task is to find the smallest sum possible while taking one element from each row.
The...read more
The task is to find the smallest sum possible while taking one element from each row, following certain rules.
Iterate through each row of the matrix
For each row, find the minimum element that can be selected based on the rules
Add the selected minimum element to the sum
Return the final sum
You are given a Circular Linked List of integers, and an integer, 'key'.
You have to write a function that finds the given key in the list and deletes it. If no such key is prese...read more
You are given an array 'ARR' consisting of 'N' integers. You need to rearrange the array elements such that all negative numbers appear before all posit...read more
Deleting an element from a circular linked list. We will be given a node and our task is to delete that node from the circular linked list.
To delete a node from a circular linked list, we need to find the previous node of the node to be deleted and update its next pointer.
Find the previous node of the node to be deleted
Update the next pointer of the previous node to skip the node to be deleted
Free the memory occupied by the node to be deleted
Searching of numbers in a given tree. In this program, we will search a particular value in the binary tree. If it is present, print the message "Element is present in the binary tree" else print the...read more
This program searches for a specific value in a binary tree and prints a message indicating its presence or absence.
Implement a recursive function to traverse the binary tree
Compare the value at each node with the target value
If the value is found, print 'Element is present in the binary tree'
If the value is not found after traversing all nodes, print 'Element is not present in the binary tree'
Q7. How you justify customer if any bug is reproduced in production?
I would explain the root cause of the bug and provide a plan to fix it.
Acknowledge the issue and apologize for the inconvenience caused
Explain the root cause of the bug and how it was missed during testing
Provide a plan to fix the bug and a timeline for the fix
Assure the customer that steps will be taken to prevent similar issues in the future
Offer compensation or a workaround if possible
Q8. How you will test two reports that point to seperate database?
To test two reports that point to separate databases, compare the data in both reports and verify their accuracy.
Identify the databases that the reports are pointing to
Retrieve the data from both databases
Compare the data in the reports to ensure they match
Verify the accuracy of the data by cross-referencing with the original sources
Perform data integrity checks to ensure the data is consistent and complete
Q9. What you know about Regulatory Reporting?
Regulatory reporting refers to the submission of data to regulatory agencies to ensure compliance with laws and regulations.
Regulatory reporting is mandatory for companies in various industries such as finance, healthcare, and energy.
It involves collecting and submitting data on various aspects of the business such as financial performance, risk management, and compliance with regulations.
The data is submitted to regulatory agencies such as the SEC, FDA, and EPA.
Regulatory re...read more
They given me 2 table containing names of different cities and told me to apply left join on them.
1) Asked me about the Languages known.
2) OOPS concepts.
3) SQL concepts(joins, acid pr...read more
Q11. What is Function overriding and Overloading?
Function overriding is when a subclass provides a different implementation of a method already defined in its superclass. Function overloading is when multiple methods with the same name but different parameters are defined in a class.
Function overriding is used to achieve runtime polymorphism.
In function overriding, the method signature remains the same but the implementation is different in the subclass.
Function overloading is used to achieve compile-time polymorphism.
In fu...read more
Q12. Have you worked on monitoring windows applications? Explain
Yes, I have experience in monitoring windows applications.
I have used tools like Microsoft System Center Operations Manager (SCOM) and SolarWinds to monitor windows applications.
I have set up alerts and notifications for critical events and thresholds.
I have also created custom dashboards to track performance metrics and identify issues.
Examples of applications I have monitored include Microsoft Exchange, SQL Server, and IIS.
I have worked with both on-premises and cloud-based...read more
Q13. Which ML algorithm did you use in your project?
I used the Random Forest algorithm in my project.
Random Forest is an ensemble learning method that combines multiple decision trees to make predictions.
It is used for both classification and regression tasks.
Random Forest reduces overfitting and provides feature importance.
Example: I used Random Forest to predict customer churn in a telecom company.
Q14. Profit and loss account and Balance sheet Difference
The profit and loss account shows the company's revenues, expenses, and net profit or loss for a specific period. The balance sheet provides a snapshot of the company's assets, liabilities, and equity at a specific point in time.
Profit and loss account shows the financial performance of a company over a specific period, usually a year.
It includes revenues, expenses, and the resulting net profit or loss.
Balance sheet shows the financial position of a company at a specific poin...read more
Q15. Explain event monitoring and the tools used in support
Event monitoring is the process of tracking and analyzing system events to identify issues and improve performance.
Tools used for event monitoring include Nagios, Zabbix, and SolarWinds.
Event monitoring can help detect security breaches, system failures, and performance issues.
It involves setting up alerts and notifications for specific events and analyzing data to identify patterns and trends.
Event monitoring can also be used for compliance and auditing purposes.
Real-time mo...read more
Q16. How do you use CI/CD pipeline in operations?
CI/CD pipeline is used in operations to automate the deployment process and ensure consistency and reliability.
CI/CD pipeline is used to automate the build, test, and deployment process of applications.
It ensures consistency and reliability by automating the entire process, reducing the risk of human error.
It allows for faster deployment of applications, as changes can be quickly tested and deployed.
It also enables continuous monitoring and feedback, allowing for quick identi...read more
Q17. How to implement authentication and authorisation in Web api
Authentication and authorization can be implemented in Web API using various methods such as OAuth, JWT, and Identity Framework.
Use OAuth for third-party authentication and authorization
Use JWT for token-based authentication and authorization
Use Identity Framework for role-based authentication and authorization
Implement HTTPS to secure communication between client and server
Use secure password storage techniques such as hashing and salting
Implement rate limiting to prevent br...read more
Q18. What do you understand by joins in sql?
Joins in SQL are used to combine rows from two or more tables based on a related column between them.
Joins are used to retrieve data from multiple tables in a single query.
Common types of joins include inner join, left join, right join, and full outer join.
Joins are performed using the JOIN keyword and specifying the columns to join on.
Joins can be used to combine tables based on matching values or non-matching values.
Joins help in creating relationships between tables and fe...read more
Q19. 5 Important Components in Test Plan?
5 important components in a test plan are objectives, scope, test strategy, test cases, and test environment.
Objectives: Clearly define the purpose and goals of testing.
Scope: Define the boundaries of testing, what is included and excluded.
Test Strategy: Define the approach to testing, including types of testing and tools used.
Test Cases: Define the specific tests to be executed, including expected results.
Test Environment: Define the hardware, software, and network configura...read more
Q20. What is Sql? And what is a database?
SQL is a programming language used for managing and manipulating relational databases. A database is a structured collection of data.
SQL is used to retrieve, insert, update, and delete data from a database.
A database is a software system that stores and organizes data in a structured manner.
SQL allows users to define the structure of a database, create tables, and establish relationships between tables.
Examples of databases include MySQL, Oracle, and SQL Server.
Q21. Tell me one critical problem statement of your application in which you have automated and the solution you have provided for the same
One critical problem statement automated was testing the login functionality for multiple user roles
Automated testing of login functionality for different user roles
Used Selenium WebDriver to automate login process
Created test scripts to simulate login scenarios for admin, user, and guest roles
Q22. What is GST rate applicable to our industry
The GST rate applicable to your industry depends on the type of goods or services you provide.
GST rates range from 0% to 28% depending on the category of goods or services
Some goods and services are exempt from GST
For example, the GST rate for processed food items is 5%, while it is 18% for luxury items like cars
It is important to consult with a tax expert to determine the exact GST rate applicable to your industry
Information security refers to the practice of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction.
Information security involves implementing measures to safeguard data and systems from potential threats.
It includes the protection of confidentiality, integrity, and availability of information.
Examples of information security measures include encryption, access controls, firewalls, and antivirus software.
Information securi...read more
Q24. What is token based authentication
Token based authentication is a security mechanism that uses a token to authenticate a user instead of a password.
Tokens are generated by the server and sent to the client upon successful login
The client then sends the token with each subsequent request to the server
The server verifies the token and grants access to protected resources
Tokens can have an expiration time and can be revoked by the server
Examples include JWT, OAuth2, and SAML
Q25. What is Product life cycle?
Product life cycle refers to the stages a product goes through from its introduction to its decline and eventual discontinuation.
The stages of product life cycle are: introduction, growth, maturity, decline, and discontinuation.
During the introduction stage, the product is launched and marketed to create awareness and generate demand.
In the growth stage, sales and revenue increase rapidly as the product gains popularity.
During the maturity stage, sales growth slows down and t...read more
Q26. What are solid principles with example
SOLID principles are design principles for object-oriented programming.
Single Responsibility Principle: A class should have only one reason to change.
Open-Closed Principle: Software entities should be open for extension but closed for modification.
Liskov Substitution Principle: Subtypes must be substitutable for their base types.
Interface Segregation Principle: Clients should not be forced to depend on interfaces they do not use.
Dependency Inversion Principle: High-level modu...read more
Q27. What is TDS rate applicable on Rent
TDS rate applicable on Rent is 10% if the annual rent exceeds Rs. 2.4 lakhs.
TDS stands for Tax Deducted at Source
The rate of TDS on rent is 10%
If the annual rent exceeds Rs. 2.4 lakhs, TDS is applicable
The TDS amount is deducted by the tenant and deposited with the government
The TDS certificate is issued by the tenant to the landlord
Q28. What is Accounting Standards 9 on
Accounting Standards 9 (AS 9) is on Revenue Recognition.
AS 9 provides guidelines for recognizing revenue in financial statements.
It outlines the criteria for revenue recognition and the methods of measurement.
It also covers the treatment of revenue from specific transactions such as sales of goods, rendering of services, and construction contracts.
AS 9 is important for ensuring accurate financial reporting and transparency in business operations.
Q29. What is Identity and access management?
Identity and access management (IAM) is the process of managing digital identities and controlling access to resources.
IAM involves creating and managing user accounts and permissions
It ensures that only authorized users have access to sensitive data and systems
IAM solutions include single sign-on (SSO), multi-factor authentication (MFA), and role-based access control (RBAC)
Examples of IAM tools include Okta, Microsoft Azure Active Directory, and Ping Identity
Q30. Which tool you have worked on IAM?
I have worked on Oracle Identity Manager (OIM) for IAM.
I have experience in configuring and managing user access and permissions using OIM.
I have worked on creating and managing roles, policies, and workflows in OIM.
I have also worked on integrating OIM with other systems such as Active Directory and LDAP.
One example of my work with OIM includes setting up a self-service portal for users to request access to specific applications.
Q31. What is A B testing in design?
A B testing in design is a method of comparing two versions of a webpage or app to determine which one performs better.
Involves creating two versions (A and B) with one differing element
Randomly showing each version to users
Analyzing user behavior and performance metrics to determine the better version
Commonly used in web design, marketing campaigns, and user experience testing
Q32. What is design patterns and examples
Design patterns are reusable solutions to common software problems.
Design patterns provide a common language for developers to communicate solutions.
Examples include Singleton, Factory, Observer, and Decorator patterns.
Design patterns can improve code quality, maintainability, and scalability.
Patterns can be categorized into creational, structural, and behavioral patterns.
Understanding design patterns is important for senior software engineers.
Q33. Explain train-test in Scikit learn
Train-test split is a method used to divide a dataset into training and testing sets for model evaluation in Scikit learn.
Split the dataset into two subsets: training set and testing set
Training set is used to train the model, while testing set is used to evaluate the model's performance
Common split ratios are 70-30 or 80-20 for training and testing sets
Example: X_train, X_test, y_train, y_test = train_test_split(X, y, test_size=0.3, random_state=42)
Q34. How mixin work in less?
Mixins in Less are reusable code blocks that can be included in other style rules.
Mixins are defined using the .mixin() function in Less.
They can be included in other style rules using the .mixinName(); syntax.
Mixins can take parameters and return values, allowing for dynamic styling.
Example: .border-radius(@radius) { border-radius: @radius; }
Example usage: .myElement { .border-radius(5px); }
Q35. What is user persona?
User persona is a fictional representation of a target user group based on research and data.
User persona helps in understanding the needs, behaviors, and goals of the target audience.
It includes demographic information, preferences, pain points, and motivations.
Example: A user persona for an e-commerce website might be 'Sara, a 30-year-old working professional who values convenience and quality.'
Q36. What is computation of Income?
Q37. Python program for string,list and oop concepts
Python program demonstrating string, list, and OOP concepts.
Create a class with attributes and methods
Use string methods like split(), join(), and replace()
Manipulate lists using append(), pop(), and slicing
Demonstrate inheritance and polymorphism
Q38. Explain Apriori Method
Apriori method is a popular algorithm for frequent itemset mining in data mining.
Used for finding frequent itemsets in transactional databases
Based on the concept of association rule mining
Involves generating candidate itemsets and pruning based on support threshold
Example: If {milk, bread} is a frequent itemset, then {milk} and {bread} are also frequent
Q39. SDLC in detail
SDLC stands for Software Development Life Cycle. It is a process used to develop software applications.
SDLC is a structured approach that consists of various phases such as requirements gathering, design, development, testing, deployment, and maintenance.
Each phase has specific activities and deliverables that ensure the successful development and delivery of software.
SDLC models include Waterfall, Agile, Spiral, and Iterative.
Waterfall model follows a sequential approach whe...read more
Q40. What is javascript?
JavaScript is a programming language commonly used for creating interactive effects within web browsers.
JavaScript is a high-level, interpreted programming language.
It is used to make web pages interactive and dynamic.
JavaScript can be used for client-side and server-side development.
Commonly used frameworks/libraries include React, Angular, and Vue.
Example: document.getElementById('demo').innerHTML = 'Hello, World!';
Q41. What is view encapsulation
View encapsulation is a technique used to isolate components in a web application from each other.
It prevents styles and scripts from bleeding into other components.
It helps in maintaining code quality and reducing conflicts.
It can be achieved using Shadow DOM or CSS modules.
Angular provides view encapsulation by default.
Q42. Deatiled conversion of the role, work expectation
The role of a Buyer involves sourcing, negotiating, and purchasing goods and services for a company.
Researching potential suppliers and evaluating their products and services
Negotiating prices and terms of contracts with suppliers
Monitoring inventory levels and forecasting demand
Collaborating with other departments to ensure timely delivery of goods
Analyzing market trends and identifying cost-saving opportunities
Q43. What is the current package
I'm sorry, could you please clarify what package you are referring to?
It's important to understand the context of the question before answering
Ask for more information to provide an accurate response
Q44. Importantance of AI & ML for invoice review.
AI & ML are important for invoice review as they automate processes, improve accuracy, and save time and costs.
AI & ML automate the invoice review process, reducing the need for manual intervention.
They can accurately identify errors, discrepancies, and fraudulent activities in invoices.
By analyzing historical data, AI & ML can predict invoice approval or rejection patterns.
They can extract relevant information from invoices, such as vendor details, amounts, and dates.
AI & ML...read more
Q45. Deep dive in technical Azure services
Azure offers a wide range of technical services for cloud computing and storage.
Azure Virtual Machines for running Windows or Linux
Azure App Service for building and deploying web and mobile apps
Azure Functions for serverless computing
Azure Storage for scalable and secure storage
Azure Cosmos DB for globally distributed databases
Azure Kubernetes Service for container orchestration
Azure Cognitive Services for AI and machine learning
Azure DevOps for continuous integration and de...read more
Q46. Managing conflicting priorities
Managing conflicting priorities involves prioritizing tasks, communication, flexibility, and problem-solving.
Prioritize tasks based on importance and deadlines
Communicate with stakeholders to understand their needs and expectations
Be flexible and willing to adjust plans as needed
Use problem-solving skills to find solutions that satisfy all parties involved
Q47. Write a program to reverse the string
Program to reverse a string using array of characters
Create an array of characters from the input string
Iterate through the array in reverse order and append each character to a new string
Return the reversed string
Q48. Individual fear is comfortable
Individual fear can be comfortable due to familiarity and predictability.
Familiarity with fear can make it comfortable as it becomes a known entity
Predictability of fear can provide a sense of control and security
Some individuals may find comfort in their fears as it gives them a sense of identity or purpose
Q49. what is oops ?
Object-oriented programming paradigm that focuses on objects and classes for code organization and reusability.
Encapsulation: bundling data and methods that operate on the data into a single unit (object)
Inheritance: ability of a class to inherit properties and behavior from another class
Polymorphism: ability to present the same interface for different data types
Abstraction: hiding the complex implementation details and showing only the necessary features
Q50. Difficulties faced
Some difficulties faced include managing complex codebases, debugging tricky issues, and keeping up with new technologies.
Managing complex codebases with multiple dependencies
Debugging tricky issues such as memory leaks or race conditions
Keeping up with new technologies and frameworks to stay competitive
Q51. oops concept in java
Oops concept in Java refers to Object-Oriented Programming principles like Inheritance, Encapsulation, Polymorphism, and Abstraction.
Inheritance allows a class to inherit properties and behavior from another class.
Encapsulation involves bundling data and methods that operate on the data into a single unit.
Polymorphism allows objects to be treated as instances of their parent class.
Abstraction hides the implementation details and only shows the necessary features of an object.
More about working at Wolters Kluwer
Top HR Questions asked in C-Edge Technologies
Interview Process at C-Edge Technologies
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month