Add office photos
Employer?
Claim Account for FREE

Wolters Kluwer

3.9
based on 449 Reviews
Filter interviews by

50+ C-Edge Technologies Interview Questions and Answers

Updated 23 Sep 2024
Q1. Water Jug Problem

You are given two water jugs with capacities X and Y litres respectively. Both the jugs are initially empty. There is an infinite amount of water supply available. The jugs do not have markings...read more

Ans.

The problem is to determine whether it is possible to measure a specific amount of water using two jugs with given capacities.

  • The jugs can be filled, emptied, and water can be poured from one jug to another.

  • If the target measure is achievable, there must be exactly Z liters of water in one or both jugs.

  • We can solve this problem using the concept of the greatest common divisor (GCD) of the jug capacities.

  • If Z is divisible by the GCD of X and Y, then it is possible to measure Z...read more

View 2 more answers
Q2. Minimum Sum in matrix

You are given a 2D matrix ‘ARR’ of size ‘N x 3’ having integers, where ‘N’ is the number of rows.

Your task is to find the smallest sum possible while taking one element from each row.

The...read more

Ans.

The task is to find the smallest sum possible while taking one element from each row, following certain rules.

  • Iterate through each row of the matrix

  • For each row, find the minimum element that can be selected based on the rules

  • Add the selected minimum element to the sum

  • Return the final sum

View 3 more answers
Q3. Deletion in Circular Linked List

You are given a Circular Linked List of integers, and an integer, 'key'.

You have to write a function that finds the given key in the list and deletes it. If no such key is prese...read more

View 2 more answers
Q4. Move All Negative Numbers To Beginning And Positive To End

You are given an array 'ARR' consisting of 'N' integers. You need to rearrange the array elements such that all negative numbers appear before all posit...read more

View 3 more answers
Discover C-Edge Technologies interview dos and don'ts from real experiences
Q5. Deletion in Circular Linked List

Deleting an element from a circular linked list. We will be given a node and our task is to delete that node from the circular linked list.

Ans.

To delete a node from a circular linked list, we need to find the previous node of the node to be deleted and update its next pointer.

  • Find the previous node of the node to be deleted

  • Update the next pointer of the previous node to skip the node to be deleted

  • Free the memory occupied by the node to be deleted

View 4 more answers
Q6. Find a node

Searching of numbers in a given tree. In this program, we will search a particular value in the binary tree. If it is present, print the message "Element is present in the binary tree" else print the...read more

Ans.

This program searches for a specific value in a binary tree and prints a message indicating its presence or absence.

  • Implement a recursive function to traverse the binary tree

  • Compare the value at each node with the target value

  • If the value is found, print 'Element is present in the binary tree'

  • If the value is not found after traversing all nodes, print 'Element is not present in the binary tree'

View 3 more answers
Are these interview questions helpful?

Q7. How you justify customer if any bug is reproduced in production?

Ans.

I would explain the root cause of the bug and provide a plan to fix it.

  • Acknowledge the issue and apologize for the inconvenience caused

  • Explain the root cause of the bug and how it was missed during testing

  • Provide a plan to fix the bug and a timeline for the fix

  • Assure the customer that steps will be taken to prevent similar issues in the future

  • Offer compensation or a workaround if possible

Add your answer

Q8. How you will test two reports that point to seperate database?

Ans.

To test two reports that point to separate databases, compare the data in both reports and verify their accuracy.

  • Identify the databases that the reports are pointing to

  • Retrieve the data from both databases

  • Compare the data in the reports to ensure they match

  • Verify the accuracy of the data by cross-referencing with the original sources

  • Perform data integrity checks to ensure the data is consistent and complete

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What you know about Regulatory Reporting?

Ans.

Regulatory reporting refers to the submission of data to regulatory agencies to ensure compliance with laws and regulations.

  • Regulatory reporting is mandatory for companies in various industries such as finance, healthcare, and energy.

  • It involves collecting and submitting data on various aspects of the business such as financial performance, risk management, and compliance with regulations.

  • The data is submitted to regulatory agencies such as the SEC, FDA, and EPA.

  • Regulatory re...read more

Add your answer
Q10. Basic Interview Questions

They given me 2 table containing names of different cities and told me to apply left join on them.

1) Asked me about the Languages known.
2) OOPS concepts.
3) SQL concepts(joins, acid pr...read more

Add your answer

Q11. What is Function overriding and Overloading?

Ans.

Function overriding is when a subclass provides a different implementation of a method already defined in its superclass. Function overloading is when multiple methods with the same name but different parameters are defined in a class.

  • Function overriding is used to achieve runtime polymorphism.

  • In function overriding, the method signature remains the same but the implementation is different in the subclass.

  • Function overloading is used to achieve compile-time polymorphism.

  • In fu...read more

Add your answer

Q12. Have you worked on monitoring windows applications? Explain

Ans.

Yes, I have experience in monitoring windows applications.

  • I have used tools like Microsoft System Center Operations Manager (SCOM) and SolarWinds to monitor windows applications.

  • I have set up alerts and notifications for critical events and thresholds.

  • I have also created custom dashboards to track performance metrics and identify issues.

  • Examples of applications I have monitored include Microsoft Exchange, SQL Server, and IIS.

  • I have worked with both on-premises and cloud-based...read more

Add your answer

Q13. Which ML algorithm did you use in your project?

Ans.

I used the Random Forest algorithm in my project.

  • Random Forest is an ensemble learning method that combines multiple decision trees to make predictions.

  • It is used for both classification and regression tasks.

  • Random Forest reduces overfitting and provides feature importance.

  • Example: I used Random Forest to predict customer churn in a telecom company.

Add your answer

Q14. Profit and loss account and Balance sheet Difference

Ans.

The profit and loss account shows the company's revenues, expenses, and net profit or loss for a specific period. The balance sheet provides a snapshot of the company's assets, liabilities, and equity at a specific point in time.

  • Profit and loss account shows the financial performance of a company over a specific period, usually a year.

  • It includes revenues, expenses, and the resulting net profit or loss.

  • Balance sheet shows the financial position of a company at a specific poin...read more

View 1 answer

Q15. Explain event monitoring and the tools used in support

Ans.

Event monitoring is the process of tracking and analyzing system events to identify issues and improve performance.

  • Tools used for event monitoring include Nagios, Zabbix, and SolarWinds.

  • Event monitoring can help detect security breaches, system failures, and performance issues.

  • It involves setting up alerts and notifications for specific events and analyzing data to identify patterns and trends.

  • Event monitoring can also be used for compliance and auditing purposes.

  • Real-time mo...read more

Add your answer

Q16. How do you use CI/CD pipeline in operations?

Ans.

CI/CD pipeline is used in operations to automate the deployment process and ensure consistency and reliability.

  • CI/CD pipeline is used to automate the build, test, and deployment process of applications.

  • It ensures consistency and reliability by automating the entire process, reducing the risk of human error.

  • It allows for faster deployment of applications, as changes can be quickly tested and deployed.

  • It also enables continuous monitoring and feedback, allowing for quick identi...read more

Add your answer

Q17. How to implement authentication and authorisation in Web api

Ans.

Authentication and authorization can be implemented in Web API using various methods such as OAuth, JWT, and Identity Framework.

  • Use OAuth for third-party authentication and authorization

  • Use JWT for token-based authentication and authorization

  • Use Identity Framework for role-based authentication and authorization

  • Implement HTTPS to secure communication between client and server

  • Use secure password storage techniques such as hashing and salting

  • Implement rate limiting to prevent br...read more

Add your answer

Q18. What do you understand by joins in sql?

Ans.

Joins in SQL are used to combine rows from two or more tables based on a related column between them.

  • Joins are used to retrieve data from multiple tables in a single query.

  • Common types of joins include inner join, left join, right join, and full outer join.

  • Joins are performed using the JOIN keyword and specifying the columns to join on.

  • Joins can be used to combine tables based on matching values or non-matching values.

  • Joins help in creating relationships between tables and fe...read more

Add your answer

Q19. 5 Important Components in Test Plan?

Ans.

5 important components in a test plan are objectives, scope, test strategy, test cases, and test environment.

  • Objectives: Clearly define the purpose and goals of testing.

  • Scope: Define the boundaries of testing, what is included and excluded.

  • Test Strategy: Define the approach to testing, including types of testing and tools used.

  • Test Cases: Define the specific tests to be executed, including expected results.

  • Test Environment: Define the hardware, software, and network configura...read more

View 1 answer

Q20. What is Sql? And what is a database?

Ans.

SQL is a programming language used for managing and manipulating relational databases. A database is a structured collection of data.

  • SQL is used to retrieve, insert, update, and delete data from a database.

  • A database is a software system that stores and organizes data in a structured manner.

  • SQL allows users to define the structure of a database, create tables, and establish relationships between tables.

  • Examples of databases include MySQL, Oracle, and SQL Server.

Add your answer

Q21. Tell me one critical problem statement of your application in which you have automated and the solution you have provided for the same

Ans.

One critical problem statement automated was testing the login functionality for multiple user roles

  • Automated testing of login functionality for different user roles

  • Used Selenium WebDriver to automate login process

  • Created test scripts to simulate login scenarios for admin, user, and guest roles

Add your answer

Q22. What is GST rate applicable to our industry

Ans.

The GST rate applicable to your industry depends on the type of goods or services you provide.

  • GST rates range from 0% to 28% depending on the category of goods or services

  • Some goods and services are exempt from GST

  • For example, the GST rate for processed food items is 5%, while it is 18% for luxury items like cars

  • It is important to consult with a tax expert to determine the exact GST rate applicable to your industry

Add your answer
Q23. What is information security.
Ans.

Information security refers to the practice of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction.

  • Information security involves implementing measures to safeguard data and systems from potential threats.

  • It includes the protection of confidentiality, integrity, and availability of information.

  • Examples of information security measures include encryption, access controls, firewalls, and antivirus software.

  • Information securi...read more

View 1 answer

Q24. What is token based authentication

Ans.

Token based authentication is a security mechanism that uses a token to authenticate a user instead of a password.

  • Tokens are generated by the server and sent to the client upon successful login

  • The client then sends the token with each subsequent request to the server

  • The server verifies the token and grants access to protected resources

  • Tokens can have an expiration time and can be revoked by the server

  • Examples include JWT, OAuth2, and SAML

Add your answer

Q25. What is Product life cycle?

Ans.

Product life cycle refers to the stages a product goes through from its introduction to its decline and eventual discontinuation.

  • The stages of product life cycle are: introduction, growth, maturity, decline, and discontinuation.

  • During the introduction stage, the product is launched and marketed to create awareness and generate demand.

  • In the growth stage, sales and revenue increase rapidly as the product gains popularity.

  • During the maturity stage, sales growth slows down and t...read more

Add your answer

Q26. What are solid principles with example

Ans.

SOLID principles are design principles for object-oriented programming.

  • Single Responsibility Principle: A class should have only one reason to change.

  • Open-Closed Principle: Software entities should be open for extension but closed for modification.

  • Liskov Substitution Principle: Subtypes must be substitutable for their base types.

  • Interface Segregation Principle: Clients should not be forced to depend on interfaces they do not use.

  • Dependency Inversion Principle: High-level modu...read more

Add your answer

Q27. What is TDS rate applicable on Rent

Ans.

TDS rate applicable on Rent is 10% if the annual rent exceeds Rs. 2.4 lakhs.

  • TDS stands for Tax Deducted at Source

  • The rate of TDS on rent is 10%

  • If the annual rent exceeds Rs. 2.4 lakhs, TDS is applicable

  • The TDS amount is deducted by the tenant and deposited with the government

  • The TDS certificate is issued by the tenant to the landlord

Add your answer

Q28. What is Accounting Standards 9 on

Ans.

Accounting Standards 9 (AS 9) is on Revenue Recognition.

  • AS 9 provides guidelines for recognizing revenue in financial statements.

  • It outlines the criteria for revenue recognition and the methods of measurement.

  • It also covers the treatment of revenue from specific transactions such as sales of goods, rendering of services, and construction contracts.

  • AS 9 is important for ensuring accurate financial reporting and transparency in business operations.

Add your answer

Q29. What is Identity and access management?

Ans.

Identity and access management (IAM) is the process of managing digital identities and controlling access to resources.

  • IAM involves creating and managing user accounts and permissions

  • It ensures that only authorized users have access to sensitive data and systems

  • IAM solutions include single sign-on (SSO), multi-factor authentication (MFA), and role-based access control (RBAC)

  • Examples of IAM tools include Okta, Microsoft Azure Active Directory, and Ping Identity

Add your answer

Q30. Which tool you have worked on IAM?

Ans.

I have worked on Oracle Identity Manager (OIM) for IAM.

  • I have experience in configuring and managing user access and permissions using OIM.

  • I have worked on creating and managing roles, policies, and workflows in OIM.

  • I have also worked on integrating OIM with other systems such as Active Directory and LDAP.

  • One example of my work with OIM includes setting up a self-service portal for users to request access to specific applications.

Add your answer

Q31. What is A B testing in design?

Ans.

A B testing in design is a method of comparing two versions of a webpage or app to determine which one performs better.

  • Involves creating two versions (A and B) with one differing element

  • Randomly showing each version to users

  • Analyzing user behavior and performance metrics to determine the better version

  • Commonly used in web design, marketing campaigns, and user experience testing

Add your answer

Q32. What is design patterns and examples

Ans.

Design patterns are reusable solutions to common software problems.

  • Design patterns provide a common language for developers to communicate solutions.

  • Examples include Singleton, Factory, Observer, and Decorator patterns.

  • Design patterns can improve code quality, maintainability, and scalability.

  • Patterns can be categorized into creational, structural, and behavioral patterns.

  • Understanding design patterns is important for senior software engineers.

Add your answer

Q33. Explain train-test in Scikit learn

Ans.

Train-test split is a method used to divide a dataset into training and testing sets for model evaluation in Scikit learn.

  • Split the dataset into two subsets: training set and testing set

  • Training set is used to train the model, while testing set is used to evaluate the model's performance

  • Common split ratios are 70-30 or 80-20 for training and testing sets

  • Example: X_train, X_test, y_train, y_test = train_test_split(X, y, test_size=0.3, random_state=42)

Add your answer

Q34. How mixin work in less?

Ans.

Mixins in Less are reusable code blocks that can be included in other style rules.

  • Mixins are defined using the .mixin() function in Less.

  • They can be included in other style rules using the .mixinName(); syntax.

  • Mixins can take parameters and return values, allowing for dynamic styling.

  • Example: .border-radius(@radius) { border-radius: @radius; }

  • Example usage: .myElement { .border-radius(5px); }

Add your answer

Q35. What is user persona?

Ans.

User persona is a fictional representation of a target user group based on research and data.

  • User persona helps in understanding the needs, behaviors, and goals of the target audience.

  • It includes demographic information, preferences, pain points, and motivations.

  • Example: A user persona for an e-commerce website might be 'Sara, a 30-year-old working professional who values convenience and quality.'

Add your answer

Q36. What is computation of Income?

Add your answer

Q37. Python program for string,list and oop concepts

Ans.

Python program demonstrating string, list, and OOP concepts.

  • Create a class with attributes and methods

  • Use string methods like split(), join(), and replace()

  • Manipulate lists using append(), pop(), and slicing

  • Demonstrate inheritance and polymorphism

Add your answer

Q38. Explain Apriori Method

Ans.

Apriori method is a popular algorithm for frequent itemset mining in data mining.

  • Used for finding frequent itemsets in transactional databases

  • Based on the concept of association rule mining

  • Involves generating candidate itemsets and pruning based on support threshold

  • Example: If {milk, bread} is a frequent itemset, then {milk} and {bread} are also frequent

Add your answer

Q39. SDLC in detail

Ans.

SDLC stands for Software Development Life Cycle. It is a process used to develop software applications.

  • SDLC is a structured approach that consists of various phases such as requirements gathering, design, development, testing, deployment, and maintenance.

  • Each phase has specific activities and deliverables that ensure the successful development and delivery of software.

  • SDLC models include Waterfall, Agile, Spiral, and Iterative.

  • Waterfall model follows a sequential approach whe...read more

Add your answer

Q40. What is javascript?

Ans.

JavaScript is a programming language commonly used for creating interactive effects within web browsers.

  • JavaScript is a high-level, interpreted programming language.

  • It is used to make web pages interactive and dynamic.

  • JavaScript can be used for client-side and server-side development.

  • Commonly used frameworks/libraries include React, Angular, and Vue.

  • Example: document.getElementById('demo').innerHTML = 'Hello, World!';

Add your answer

Q41. What is view encapsulation

Ans.

View encapsulation is a technique used to isolate components in a web application from each other.

  • It prevents styles and scripts from bleeding into other components.

  • It helps in maintaining code quality and reducing conflicts.

  • It can be achieved using Shadow DOM or CSS modules.

  • Angular provides view encapsulation by default.

Add your answer

Q42. Deatiled conversion of the role, work expectation

Ans.

The role of a Buyer involves sourcing, negotiating, and purchasing goods and services for a company.

  • Researching potential suppliers and evaluating their products and services

  • Negotiating prices and terms of contracts with suppliers

  • Monitoring inventory levels and forecasting demand

  • Collaborating with other departments to ensure timely delivery of goods

  • Analyzing market trends and identifying cost-saving opportunities

Add your answer

Q43. What is the current package

Ans.

I'm sorry, could you please clarify what package you are referring to?

  • It's important to understand the context of the question before answering

  • Ask for more information to provide an accurate response

Add your answer

Q44. Importantance of AI & ML for invoice review.

Ans.

AI & ML are important for invoice review as they automate processes, improve accuracy, and save time and costs.

  • AI & ML automate the invoice review process, reducing the need for manual intervention.

  • They can accurately identify errors, discrepancies, and fraudulent activities in invoices.

  • By analyzing historical data, AI & ML can predict invoice approval or rejection patterns.

  • They can extract relevant information from invoices, such as vendor details, amounts, and dates.

  • AI & ML...read more

Add your answer

Q45. Deep dive in technical Azure services

Ans.

Azure offers a wide range of technical services for cloud computing and storage.

  • Azure Virtual Machines for running Windows or Linux

  • Azure App Service for building and deploying web and mobile apps

  • Azure Functions for serverless computing

  • Azure Storage for scalable and secure storage

  • Azure Cosmos DB for globally distributed databases

  • Azure Kubernetes Service for container orchestration

  • Azure Cognitive Services for AI and machine learning

  • Azure DevOps for continuous integration and de...read more

Add your answer

Q46. Managing conflicting priorities

Ans.

Managing conflicting priorities involves prioritizing tasks, communication, flexibility, and problem-solving.

  • Prioritize tasks based on importance and deadlines

  • Communicate with stakeholders to understand their needs and expectations

  • Be flexible and willing to adjust plans as needed

  • Use problem-solving skills to find solutions that satisfy all parties involved

Add your answer

Q47. Write a program to reverse the string

Ans.

Program to reverse a string using array of characters

  • Create an array of characters from the input string

  • Iterate through the array in reverse order and append each character to a new string

  • Return the reversed string

Add your answer

Q48. Individual fear is comfortable

Ans.

Individual fear can be comfortable due to familiarity and predictability.

  • Familiarity with fear can make it comfortable as it becomes a known entity

  • Predictability of fear can provide a sense of control and security

  • Some individuals may find comfort in their fears as it gives them a sense of identity or purpose

Add your answer

Q49. what is oops ?

Ans.

Object-oriented programming paradigm that focuses on objects and classes for code organization and reusability.

  • Encapsulation: bundling data and methods that operate on the data into a single unit (object)

  • Inheritance: ability of a class to inherit properties and behavior from another class

  • Polymorphism: ability to present the same interface for different data types

  • Abstraction: hiding the complex implementation details and showing only the necessary features

Add your answer

Q50. Difficulties faced

Ans.

Some difficulties faced include managing complex codebases, debugging tricky issues, and keeping up with new technologies.

  • Managing complex codebases with multiple dependencies

  • Debugging tricky issues such as memory leaks or race conditions

  • Keeping up with new technologies and frameworks to stay competitive

Add your answer

Q51. oops concept in java

Ans.

Oops concept in Java refers to Object-Oriented Programming principles like Inheritance, Encapsulation, Polymorphism, and Abstraction.

  • Inheritance allows a class to inherit properties and behavior from another class.

  • Encapsulation involves bundling data and methods that operate on the data into a single unit.

  • Polymorphism allows objects to be treated as instances of their parent class.

  • Abstraction hides the implementation details and only shows the necessary features of an object.

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at C-Edge Technologies

based on 33 interviews in the last 1 year
Interview experience
4.2
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.0
 • 518 Interview Questions
4.0
 • 460 Interview Questions
4.0
 • 200 Interview Questions
3.2
 • 161 Interview Questions
3.2
 • 160 Interview Questions
3.6
 • 133 Interview Questions
View all
Top Wolters Kluwer Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter