
YASH Technologies


100+ YASH Technologies Interview Questions and Answers
Q1. 1) describe the Cloud architecture for the azure storage, blob , cloud services? 2) describe the integration of Web API related questions for email and sms applications? 3) describe the .net core aspects for so...
read moreAnswers to interview questions for Module Lead position
1) Azure storage architecture includes Blob storage and Cloud Services
2) Web API integration for email and SMS applications involves sending requests to the API endpoints
3) .NET Core aspects for solid programming implementation and integration concepts include dependency injection and middleware
4) Encryption is the process of converting data into a secure form, while encoding is the process of converting data into a speci...read more
Q2. What is GCD? Explain in details
GCD stands for Greatest Common Divisor. It is the largest positive integer that divides two or more numbers without leaving a remainder.
GCD is used to find the highest common factor between two or more numbers.
It is often used in mathematical calculations and algorithms.
GCD can be calculated using various methods like Euclidean algorithm or prime factorization.
Example: GCD of 12 and 18 is 6, as 6 is the largest number that divides both 12 and 18 without leaving a remainder.
Q3. How different microservices communicate with each other
Microservices communicate with each other through APIs, message queues, or event-driven architecture.
APIs: Microservices can communicate with each other through RESTful APIs or GraphQL.
Message queues: Services can use message brokers like RabbitMQ or Kafka to send and receive messages.
Event-driven architecture: Services can publish events to a message broker and subscribe to events they are interested in.
Service discovery: Services can use tools like Consul or Eureka to disco...read more
Q4. How to handle http requests in Spring Boot
Handling http requests in Spring Boot involves creating controller classes, mapping endpoints, and using annotations like @RestController and @RequestMapping.
Create a controller class with @RestController annotation
Map endpoints using @RequestMapping annotation
Use @GetMapping, @PostMapping, @PutMapping, @DeleteMapping annotations for specific HTTP methods
Inject dependencies using @Autowired annotation
Q5. Where will be microservices deployed in AWS
Microservices can be deployed in AWS using services like ECS, EKS, Lambda, or Fargate.
Microservices can be deployed on AWS Elastic Container Service (ECS) for containerized applications.
AWS Elastic Kubernetes Service (EKS) can be used for deploying microservices using Kubernetes.
Serverless microservices can be deployed using AWS Lambda.
AWS Fargate provides serverless compute for containers, allowing for easy deployment of microservices.
Q6. how to create primary key through programming
Primary key can be created through programming by using SQL commands or ORM frameworks.
Use SQL commands like CREATE TABLE to define primary key constraints
Use ORM frameworks like Hibernate to define primary key annotations
Primary key can be a single column or a combination of columns
Primary key ensures uniqueness and helps in faster data retrieval
Q7. How to find duplicate in unsorted array
Use a hash set to keep track of seen elements and identify duplicates in an unsorted array of strings.
Iterate through the array and add each element to a hash set.
If an element is already in the hash set, it is a duplicate.
Example: ['apple', 'banana', 'apple', 'orange'] => 'apple' is a duplicate.
Q8. Enum dictionary sets array explain
Enum dictionary sets array of strings
An enum is a set of named values
A dictionary maps keys to values
An array is a collection of elements
The enum values can be used as keys in the dictionary to map to an array of strings
Q9. Difference between Structure VS class
Structures are value types while classes are reference types.
Structures are allocated on stack while classes are allocated on heap.
Structures do not support inheritance while classes do.
Structures cannot have destructors while classes can.
Structures are used for small data structures while classes are used for larger, more complex objects.
Example of structure: struct Point { int x, y; }
Example of class: class Person { string name; int age; }
Q10. What is Streams in java8
Streams in Java 8 provide a way to process collections of objects in a functional style.
Streams allow for functional-style operations on collections, such as map, filter, and reduce.
Streams can be sequential or parallel, allowing for efficient processing of large datasets.
Streams do not store elements, they are processed on-demand as needed.
Example: List
names = Arrays.asList("Alice", "Bob", "Charlie"); Stream stream = names.stream();
Q11. How the Hashmap works
Hashmap is a data structure that stores key-value pairs and allows for quick retrieval of values based on keys.
Hashmap uses a hash function to map keys to indices in an array.
Collisions can occur when multiple keys hash to the same index, which can be resolved using techniques like chaining or open addressing.
Hashmap provides constant time complexity O(1) for insertion, deletion, and retrieval operations.
Example: HashMap
map = new HashMap<>(); map.put("key1", 1); int value = ...read more
Q12. Explain Solid principle?
SOLID is a set of principles for object-oriented programming to make software more maintainable, scalable, and robust.
S - Single Responsibility Principle
O - Open-Closed Principle
L - Liskov Substitution Principle
I - Interface Segregation Principle
D - Dependency Inversion Principle
Q13. Explain ARC with example?
ARC is Automatic Reference Counting used in iOS to manage memory.
ARC is a memory management technique used in iOS development.
It automatically manages the memory of objects in an iOS app.
ARC keeps track of the number of references to an object and deallocates it when there are no more references.
Example: If an object is assigned to a variable, ARC increments the reference count by 1. If the variable is reassigned or goes out of scope, ARC decrements the reference count by 1.
A...read more
Q14. 3.how will you read unstructured table and convert to structured table
To read an unstructured table and convert it to a structured table, you can use OCR technology and data extraction techniques.
Use Optical Character Recognition (OCR) technology to extract text from the unstructured table.
Apply data extraction techniques such as regular expressions or keyword matching to identify and extract relevant information from the extracted text.
Organize the extracted data into a structured table format by assigning appropriate column headers and arrang...read more
Q15. Authentication vs Authorization
Authentication verifies the identity of a user, while authorization determines what a user can access.
Authentication confirms the user's identity through credentials like passwords or biometrics.
Authorization determines the user's permissions and access levels to resources.
Example: Logging into a system with a username and password is authentication. Being able to view certain files based on your role is authorization.
Q16. Exception handling in spring boot
Exception handling in Spring Boot involves using @ControllerAdvice, @ExceptionHandler, and ResponseEntity.
Use @ControllerAdvice to define global exception handling for all controllers
Use @ExceptionHandler to handle specific exceptions in individual controllers
Return ResponseEntity with appropriate status codes and error messages
Q17. In angular how we can pass data parent to child.
In Angular, data can be passed from parent to child components using @Input decorator.
Use @Input decorator in the child component to receive data from the parent component
Define a property in the child component with @Input decorator and assign the value passed from the parent component
Parent component should bind the data to the child component using property binding in the template
Q18. 1.how can you save double values in asset
Double values can be saved in assets by converting them to string format.
Convert the double value to a string using the appropriate method or function.
Save the string value in the asset.
When retrieving the value from the asset, convert the string back to a double using the appropriate method or function.
Q19. diff b/w get and load method in hibernate
get() method returns null if the object is not found in the database, while load() method throws an exception.
get() method is eager loading while load() method is lazy loading.
get() method hits the database immediately while load() method hits the database only when the object is accessed.
get() method returns a proxy object while load() method returns a real object.
get() method is used when we are not sure if the object exists in the database while load() method is used when ...read more
Q20. Find the 2nd Highest salary using sql query
Use SQL query with ORDER BY and LIMIT to find 2nd highest salary.
Use SELECT statement to retrieve salary column
Use ORDER BY clause to sort salaries in descending order
Use LIMIT 1,1 to skip the highest salary and retrieve the 2nd highest salary
Q21. What is the architecture of the project
The project follows a microservices architecture.
The project is divided into small, independent services that communicate with each other through APIs.
Each service is responsible for a specific task or functionality.
The architecture allows for scalability, flexibility, and easier maintenance.
Examples of microservices used in the project include user management, payment processing, and inventory management.
Q22. Tell me about the Business Partner functionality in SAP
Business Partner functionality in SAP is used to manage all types of business partners in a single system.
Business Partner is a central master data record that contains all relevant information about a customer, vendor, or any other type of business partner.
It allows for a 360-degree view of the business partner, including contact information, payment terms, credit limits, and transaction history.
Business Partner functionality can be used in various SAP modules such as Sales ...read more
Q23. Tell the Configuration steps to run the APP in SAP
The configuration steps to run the APP in SAP involve defining the payment methods, creating house banks, setting up payment program variants, and configuring the payment medium formats.
Define payment methods in the system
Create house banks and assign them to company codes
Set up payment program variants
Configure the payment medium formats
Define payment methods per country
Assign payment methods to company codes
Define bank determination rules
Configure the payment program parame...read more
Q24. 2.How will you get particular cell value from data table
Use 'DataTable.Rows' property to get particular cell value from data table.
Use 'DataTable.Rows' property to get the rows of the data table.
Use 'DataRow.ItemArray' property to get the values of all the cells in a row.
Use 'DataRow.Item' property to get the value of a particular cell in a row by specifying the column name or index.
Q25. what is App Center and how to use
App Center is a mobile app development platform that helps build, test, and distribute apps.
It offers features like crash reporting, analytics, and push notifications.
Developers can integrate App Center with their code repositories and CI/CD pipelines.
It supports multiple platforms including iOS, Android, and Windows.
App Center also provides a marketplace for third-party services and plugins.
Examples of companies using App Center include Microsoft, Adobe, and Honeywell.
Q26. 3) diff between soap and rest principles
SOAP is a protocol while REST is an architectural style for web services.
SOAP is XML-based while REST uses JSON or XML.
SOAP requires more bandwidth and processing power than REST.
SOAP has built-in error handling while REST relies on HTTP error codes.
SOAP supports both stateful and stateless communication while REST is stateless.
SOAP is more secure than REST due to its built-in security features.
Examples of SOAP-based web services include Amazon Web Services and eBay.
Examples ...read more
Q27. Find the 2nd largest number using Java 8
Use Java 8 streams to find the 2nd largest number in an array.
Convert the array to a stream using Arrays.stream()
Sort the stream in descending order using sorted()
Skip the first element (largest number) using skip(1)
Find and return the first element of the remaining stream
Q28. explain Behaviors , Custom renderers and triggers
Behaviors, custom renderers, and triggers are tools used in Xamarin.Forms to customize the appearance and behavior of controls.
Behaviors allow you to add functionality to controls without subclassing them.
Custom renderers allow you to create platform-specific renderers for controls.
Triggers allow you to change the appearance or behavior of controls based on certain conditions.
Behaviors and triggers can be used together to create complex interactions.
Custom renderers are often...read more
Q29. How to Unit test the app
Unit testing involves testing individual units of code to ensure they function as expected.
Identify the units of code to be tested
Write test cases for each unit
Execute the tests and analyze the results
Use testing frameworks like JUnit or NUnit
Mock dependencies to isolate the unit being tested
Test for edge cases and error handling
Ensure code coverage is sufficient
Q30. what all native features developed
Several native features have been developed.
Native camera app with advanced features
Built-in voice assistant with natural language processing
Gesture-based navigation system
Screen recording and screenshot tools
Biometric authentication options
Augmented reality capabilities
Q31. Mock calls and how you initiate call and convince thr prospects
Initiating mock calls involves thorough research, clear communication, and effective persuasion techniques.
Research the prospect's background and needs before the call.
Introduce yourself and the purpose of the call in a friendly and professional manner.
Highlight the benefits of your product or service that align with the prospect's needs.
Handle objections confidently and provide solutions to address their concerns.
Close the call by summarizing key points and setting up a foll...read more
Q32. What is MVVM and types
MVVM stands for Model-View-ViewModel. It is a design pattern used in software engineering.
MVVM separates the user interface from the business logic
Model represents the data and business logic
View represents the user interface
ViewModel acts as a mediator between the Model and View
Types of MVVM include Classic MVVM, Prism MVVM, and ReactiveUI MVVM
Q33. how to add push notifications
To add push notifications, you need to integrate a push notification service into your app.
Choose a push notification service provider such as Firebase Cloud Messaging or OneSignal
Integrate the push notification SDK into your app
Register your app with the push notification service provider
Create a server-side API to send push notifications to your app
Handle push notifications in your app's code
Q34. Posting Period And Fiscal Year Varients importance in SAP
Posting period and fiscal year variants are important in SAP for accurate financial reporting and compliance.
Posting period variant determines the number of posting periods in a fiscal year
Fiscal year variant defines the start and end dates of a fiscal year
Both variants are used to ensure accurate financial reporting and compliance with legal requirements
Different countries may have different fiscal year variants, such as calendar year or April to March
Posting periods can be ...read more
Q35. Sort the names using Java 8
Using Java 8, sort an array of strings containing names.
Use the Arrays.sort() method with a lambda expression to sort the array of strings.
Example: String[] names = {"Alice", "Bob", "Charlie"}; Arrays.sort(names, (a, b) -> a.compareTo(b));
Print the sorted names array to see the result.
Q36. what is xamarin profiler
Xamarin Profiler is a tool for analyzing and optimizing the performance of Xamarin apps.
Xamarin Profiler helps identify memory leaks, CPU usage, and other performance issues
It can be used with both iOS and Android apps
The tool provides detailed reports and visualizations to help developers optimize their code
Xamarin Profiler is available as part of the Visual Studio Enterprise subscription
Q37. What all design patterns used
Multiple design patterns were used including Singleton, Factory, and Observer.
Singleton pattern was used to ensure only one instance of a class is created.
Factory pattern was used to create objects without exposing the creation logic.
Observer pattern was used to notify objects of any changes in state.
Other patterns such as Decorator and Adapter were also used in specific cases.
Q38. Which exception occurred while modify Collection object
ConcurrentModificationException occurs while modifying a Collection object.
Occurs when a collection is modified while iterating over it
Thrown by methods like add, remove, clear, etc. during iteration
Can be avoided by using Iterator's remove method instead of Collection's remove method
Q39. what is messaging center
Messaging center is a platform for sending and receiving messages between users or systems.
It allows users to communicate with each other through messages.
It can be used for notifications, alerts, and updates.
Messaging center can be integrated with other systems or applications.
Examples include email, chat applications, and social media messaging.
It can also be used for automated messaging, such as appointment reminders or order confirmations.
Q40. what is exception handling
Exception handling is the process of handling errors and unexpected events in a program.
It allows a program to gracefully handle errors and prevent crashes.
It involves catching and handling exceptions using try-catch blocks.
Common exceptions include null pointer exceptions and arithmetic exceptions.
Exception handling can improve the reliability and robustness of a program.
Q41. How devops works for xamarin
DevOps for Xamarin involves continuous integration, delivery, and deployment of mobile apps.
Automated builds and testing using tools like Visual Studio App Center
Continuous delivery through app store publishing and distribution
Monitoring and logging for app performance and user feedback
Collaboration between development and operations teams for seamless app delivery
Q42. Advantages and disadvantages of Xamarin
Xamarin is a cross-platform app development tool that allows developers to build native apps for iOS, Android, and Windows using C#.
Advantages:
- Code sharing across multiple platforms
- Native performance
- Access to native APIs
- Large community support
- Integration with Visual Studio
Disadvantages:
- Limited access to some platform-specific features
- Large app size
- Requires knowledge of C#
- Licensing fees for enterprise use
- Limited third-party library support
- Debugging can be...read more
Q43. SAP Related process and what are challenges faced during project execution.
SAP related processes and challenges during project execution
SAP processes involve integrating various modules like finance, sales, and production
Challenges include complex system configuration, data migration, and user training
Managing stakeholder expectations and ensuring smooth integration with existing systems
Dealing with customization requirements and potential scope creep
Addressing technical issues and ensuring system stability
Q44. Explain OOPs and Solid Principles
OOPs is a programming paradigm that focuses on objects and their interactions. SOLID principles are a set of guidelines for OOP design.
OOPs stands for Object-Oriented Programming
It emphasizes on objects and their interactions
SOLID principles are a set of guidelines for OOP design
SOLID stands for Single Responsibility, Open-Closed, Liskov Substitution, Interface Segregation, and Dependency Inversion
Single Responsibility Principle (SRP) states that a class should have only one ...read more
Q45. How u manage this MNC environment?
I manage the MNC environment by understanding the company culture, building relationships, and adapting to changes.
Understand the company culture and values
Build strong relationships with colleagues and stakeholders
Adapt to changes in the organization
Stay up-to-date with industry trends and best practices
Communicate effectively with team members and management
Q46. What is the table associated with invoice
The table associated with invoice is VBRK (Billing Document: Header Data)
VBRK table stores header data for billing documents
Contains information such as invoice number, date, amount, etc.
Linked to other tables like VBRP (Billing Document: Item Data) for line item details
Q47. Explain Boxing vs UnBoxing
Boxing is the process of converting a value type to a reference type, while unboxing is the opposite process.
Boxing is used when a value type needs to be treated as an object, such as when passing it as a parameter to a method that expects an object.
Unboxing is used when retrieving the value of a boxed object.
Boxing and unboxing can have performance implications and should be used judiciously.
Example: int i = 42; object o = i; // boxing int j = (int)o; // unboxing
Q48. What are difffent wen api response types
Different types of API response include JSON, XML, HTML, and plain text.
JSON: Lightweight data interchange format commonly used in APIs.
XML: Markup language for encoding documents in a format that is both human-readable and machine-readable.
HTML: Standard markup language for creating web pages.
Plain text: Simple text format without any formatting or structure.
Q49. How do you create a user account in AD?
To create a user account in AD, follow these steps:
Open Active Directory Users and Computers
Right-click on the domain and select 'New' and then 'User'
Enter the user's information, such as name and password
Click 'Next' and then 'Finish' to create the account
Q50. what are the business process involve in sap pp
SAP PP involves business processes related to production planning and control.
Creation of production orders
Material requirement planning
Capacity planning
Shop floor execution
Production scheduling
Q51. Explain dependency injection.
Dependency injection is a design pattern where components are provided with their dependencies rather than creating them internally.
Dependency injection helps in achieving loose coupling between components.
It allows for easier testing by providing mock dependencies.
There are three types of dependency injection: constructor injection, setter injection, and interface injection.
Q52. what are the different types of asynchronous apex
Different types of asynchronous apex include future methods, queueable interface, and batch apex.
Future methods allow for running code asynchronously in the background.
Queueable interface allows for chaining jobs and running them in a specific order.
Batch apex is used for processing large data sets in smaller, manageable chunks.
Q53. Abstraction vs Encapsulation
Abstraction focuses on hiding unnecessary details while encapsulation focuses on hiding implementation details.
Abstraction is about showing only the necessary details to the user while hiding the rest.
Encapsulation is about wrapping data and methods into a single unit and restricting access to the internal details.
Abstraction is achieved through abstract classes and interfaces.
Encapsulation is achieved through access modifiers like private, public, and protected.
Abstraction i...read more
Q54. How will you manage SAP in a clothing business
To manage SAP in a clothing business, you need to focus on key areas such as inventory management, sales order processing, pricing, and customer management.
Implement SAP SD module to handle sales and distribution processes
Set up and maintain master data for products, customers, and pricing conditions
Manage inventory levels and ensure accurate stock availability
Process sales orders, including order entry, delivery, and billing
Monitor and analyze sales performance and customer ...read more
Q55. Tell me something about react and angular
React and Angular are popular JavaScript frameworks used for building user interfaces.
React is a JavaScript library developed by Facebook.
React uses a virtual DOM to efficiently update the user interface.
React components are reusable and can be composed to build complex UIs.
React follows a unidirectional data flow.
Angular is a TypeScript-based open-source framework developed by Google.
Angular uses a two-way data binding approach.
Angular provides a comprehensive set of tools a...read more
Q56. print cube of all the numbers in given range?
Use a loop to calculate the cube of each number in the given range and print the result.
Use a for loop to iterate through the range of numbers
Calculate the cube of each number using the formula cube = number * number * number
Print the cube of each number
Q57. What is Dynamic host configuration protocol
Dynamic Host Configuration Protocol (DHCP) is a network management protocol used to dynamically assign IP addresses and other network configuration parameters to devices on a network.
DHCP automates the IP address configuration process, reducing the need for manual intervention.
DHCP servers assign IP addresses from a pool of available addresses, ensuring that no two devices have the same IP address.
DHCP also provides other network configuration information such as subnet mask,...read more
Q58. Difference between on change and at first
On change triggers when a field value is modified, while at first triggers when a field is first loaded or displayed.
On change is used for real-time validation or calculations based on user input
At first is used for initializing values or performing actions when a field is loaded
Example: On change can be used to calculate total price when quantity is changed, while at first can be used to set default values when a form is loaded
Q59. Zero Cybersecurity Projects in Yash Technologies
Yash Technologies does not have any ongoing cybersecurity projects.
Yash Technologies currently does not have any cybersecurity projects in progress.
It is possible that Yash Technologies may focus on other areas of expertise besides cybersecurity.
The company may prioritize different types of projects over cybersecurity initiatives.
Q60. Bad Leadership with Zero Cybersecurity Skills
Bad leadership with zero cybersecurity skills can lead to serious security vulnerabilities and risks for the organization.
Lack of understanding of cybersecurity threats and best practices can result in poor decision-making regarding security measures.
Failure to prioritize cybersecurity can leave the organization vulnerable to cyber attacks and data breaches.
Ineffective communication and guidance from leadership can hinder the implementation of proper cybersecurity protocols.
E...read more
Q61. How to debug sql proc
Debugging SQL procedures involves using print statements, logging, and step-by-step execution.
Use print statements to output variable values at different stages of the procedure.
Enable logging to track the flow of the procedure and identify any errors.
Execute the procedure step-by-step to pinpoint the exact location of the issue.
Use tools like SQL Server Management Studio to debug stored procedures.
Check for syntax errors and ensure proper error handling within the procedure.
Q62. sort a list without inbuilt keyword?
Sort a list without using inbuilt keyword
Iterate through the list and compare each element with the rest to find the smallest element
Swap the smallest element with the first element
Repeat the process for the remaining elements until the list is sorted
Q63. What is accounts receivable?
Accounts receivable is the money owed to a company by its customers for goods or services provided on credit.
Accounts receivable represents the amount of money owed to a company by its customers.
It is considered an asset on the company's balance sheet.
Companies often offer credit terms to customers, allowing them to pay for goods or services at a later date.
Examples include invoices sent to customers for products or services rendered.
Monitoring accounts receivable is importan...read more
Q64. What are planning types
Planning types refer to the different approaches or methods used to create a plan for achieving a goal or objective.
There are several planning types, including strategic planning, operational planning, tactical planning, contingency planning, and crisis planning.
Strategic planning involves setting long-term goals and developing a plan to achieve them.
Operational planning focuses on the day-to-day activities required to achieve the goals set out in the strategic plan.
Tactical ...read more
Q65. what are the 7 osi model?
The 7 layers of the OSI model are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Physical layer - deals with physical connections and signals
Data Link layer - responsible for node-to-node communication
Network layer - handles routing and forwarding
Transport layer - ensures end-to-end communication
Session layer - manages sessions between applications
Presentation layer - translates data into a format that the application layer can understand
Appl...read more
Q66. What is Profiles and Permission set
Profiles and Permission sets are used in Salesforce to control access and permissions for users.
Profiles define the settings and permissions for a user, such as object and field access, record types, and page layouts.
Permission sets are used to grant additional permissions to users, without changing their profile.
Profiles are assigned to users when they are created, while permission sets can be assigned or revoked at any time.
Profiles and permission sets work together to ensu...read more
Q67. is tuple fully immutable?
Yes, tuples are fully immutable in Python.
Tuples cannot be modified once created.
Elements of a tuple cannot be changed, added, or removed.
Attempting to modify a tuple will result in a TypeError.
Example: tuple1 = (1, 2, 3) - tuple1[0] = 4 will raise a TypeError.
Q68. what is docker used for?
Docker is a platform used to develop, ship, and run applications in containers.
Docker allows developers to package their applications and dependencies into a container, which can then be easily shared and run on any system.
Containers created with Docker are lightweight, portable, and isolated from the host system, making them ideal for microservices architecture.
Docker simplifies the process of deploying and scaling applications, as well as ensuring consistency between develo...read more
Q69. What is Active Directory?
Active Directory is a Microsoft service that manages network resources and user accounts.
It provides centralized authentication and authorization for Windows-based computers.
It allows administrators to manage users, computers, and other network resources from a single location.
It uses a hierarchical structure of domains, trees, and forests to organize network resources.
It supports group policies that can be used to enforce security settings and other configurations.
It can int...read more
Q70. what is TMG? TMG events
TMG stands for Transport Management Guide. TMG events are used in SAP to control the flow of data during transport requests.
TMG is used in SAP to manage the transport of data between systems.
TMG events are used to trigger actions before and after the data is transported.
Examples of TMG events include BEFORE_IMPORT, AFTER_IMPORT, BEFORE_EXPORT, and AFTER_EXPORT.
Q71. What is Service level aggriment
A Service Level Agreement (SLA) is a contract between a service provider and its customers that defines the level of service expected.
SLA outlines the services provided, quality standards, responsibilities, and guarantees.
It sets the expectations for both the service provider and the customer.
It includes metrics for measuring service performance and penalties for not meeting the agreed-upon standards.
Examples of SLAs include response time for resolving issues, uptime guarante...read more
Q72. Any idea about integration
Integration refers to the process of combining different systems or applications to work together seamlessly.
Integration can improve efficiency and reduce errors by automating processes
APIs and middleware are commonly used for integration
Examples of integration include integrating a CRM system with a marketing automation platform
Integration can also refer to the process of merging two companies or departments
Q73. What is DHCP and DNS?
DHCP assigns IP addresses to devices on a network. DNS translates domain names to IP addresses.
DHCP stands for Dynamic Host Configuration Protocol
It automatically assigns IP addresses to devices on a network
DNS stands for Domain Name System
It translates domain names to IP addresses
DNS is used to locate websites and other resources on the internet
Q74. Any idea about automation
Automation is the use of technology to perform tasks without human intervention.
Automation can improve efficiency and reduce errors in tasks such as network monitoring and configuration management.
Tools like Ansible and Puppet can automate repetitive tasks and ensure consistency across systems.
Automation can also free up time for IT staff to focus on more strategic initiatives.
However, it's important to carefully plan and test automation to avoid unintended consequences.
Regul...read more
Q75. How dispatcher servlet works?
Dispatcher servlet in Spring MVC maps incoming requests to the appropriate handler
Dispatcher servlet is the front controller in Spring MVC
It receives all incoming requests and maps them to the appropriate handler
Handler mappings are defined in the configuration file
Dispatcher servlet uses HandlerMapping to determine the appropriate controller
Once the controller is determined, Dispatcher servlet forwards the request to it
Q76. What is PST and OST?
PST and OST are file formats used in Microsoft Outlook for storing email data.
PST stands for Personal Storage Table and is used to store email messages, contacts, calendar events, and other data in Microsoft Outlook.
OST stands for Offline Storage Table and is a local copy of an Exchange mailbox that allows users to access their email data even when they are not connected to the server.
PST files are typically used for POP3 and IMAP email accounts, while OST files are used for ...read more
Q77. How to modify Collection
Collections in Java can be modified using methods like add, remove, and clear.
Use add() method to add elements to a collection
Use remove() method to remove elements from a collection
Use clear() method to remove all elements from a collection
Q78. Dbcc commands and list them
DBCC commands are used to check the consistency and integrity of a database.
DBCC CHECKDB - checks the logical and physical integrity of all objects in the specified database
DBCC CHECKTABLE - checks the integrity of all the pages and structures that make up the table
DBCC CHECKALLOC - checks the consistency of disk space allocation structures for a specified database
DBCC SHRINKDATABASE - shrinks the size of the specified database
DBCC SHRINKFILE - shrinks the size of the specifi...read more
Q79. What is components of vpc
Components of VPC include subnets, route tables, internet gateways, security groups, network access control lists, and VPN connections.
Subnets
Route tables
Internet gateways
Security groups
Network access control lists
VPN connections
Q80. Explain any 3 design patterns
Design patterns are reusable solutions to common problems in software design.
Singleton Pattern: Ensures a class has only one instance and provides a global point of access to it.
Factory Pattern: Creates objects without specifying the exact class of object that will be created.
Observer Pattern: Defines a one-to-many dependency between objects so that when one object changes state, all its dependents are notified and updated automatically.
Q81. Tell about configuration
Configuration refers to the process of setting up and customizing software or hardware to meet specific requirements.
Configuration involves setting up and customizing software or hardware
It is done to meet specific requirements
Examples include setting up a new computer or customizing software settings
Q82. Trigger write with logic explanation
A trigger write with logic explanation in software development.
Triggers are database objects that are automatically executed or fired when certain events occur in a database.
Triggers can be used to enforce business rules, validate input data, or maintain referential integrity.
Example: A trigger can be set up to automatically update a 'last_modified' timestamp whenever a record is updated in a table.
Q83. What is strategic sourcing
Strategic sourcing is a proactive approach to procurement that focuses on long-term value creation and supplier relationship management.
Strategic sourcing involves analyzing the organization's needs and identifying the best suppliers to meet those needs.
It aims to optimize costs, quality, and delivery by leveraging market intelligence and negotiating favorable contracts.
Strategic sourcing emphasizes long-term partnerships with suppliers to drive innovation and continuous impr...read more
Q84. What is the s2p process
The s2p process refers to the source-to-pay process, which encompasses all activities from sourcing suppliers to making payments.
The s2p process involves identifying and selecting suppliers.
It includes negotiating contracts and pricing with suppliers.
It also involves managing supplier relationships and performance.
The process includes requisitioning, ordering, and receiving goods or services.
It encompasses invoice processing and payment to suppliers.
Examples of tools used in ...read more
Q85. what are html tags.
HTML tags are used to define the structure and content of a web page.
HTML tags are enclosed in angle brackets, like <tag>.
They are used to define elements such as headings, paragraphs, images, links, etc.
Tags usually come in pairs - an opening tag <tag> and a closing tag </tag>.
Some tags are self-closing, like <img src='image.jpg' />.
Attributes can be added to tags to provide additional information, like <a href='https://www.example.com'>Link</a>.
Q86. Any idea about Azure
Azure is a cloud computing platform by Microsoft.
Azure offers a wide range of services including virtual machines, storage, and databases.
It allows users to build, deploy, and manage applications and services through a global network of Microsoft-managed data centers.
Azure also provides tools for analytics, machine learning, and Internet of Things (IoT) applications.
Some popular Azure services include Azure Virtual Machines, Azure SQL Database, and Azure App Service.
Azure is ...read more
Q87. What is constructor?
A constructor is a special type of method that is used to initialize objects in a class.
Constructors have the same name as the class they belong to.
They do not have a return type.
Constructors are called automatically when an object is created.
They can be used to set initial values for object attributes.
Q88. Revenue Target in last 3 years
Achieved revenue targets consistently over the past 3 years.
Exceeded revenue targets by 10% in 2018
Met revenue targets in 2019
Surpassed revenue targets by 15% in 2020
Q89. Design pattern if any 2
Two design patterns are Singleton and Observer.
Singleton pattern ensures only one instance of a class exists.
Observer pattern allows objects to be notified of changes in another object.
Singleton can be implemented using lazy initialization or eager initialization.
Observer pattern can be used in event-driven systems or GUI frameworks.
Example of Singleton: Database connection manager.
Example of Observer: GUI components listening to changes in a model.
Q90. Terraform code for ec2 and vpc
Terraform code for creating EC2 instance and VPC
Use Terraform resources 'aws_instance' for EC2 and 'aws_vpc' for VPC
Specify necessary parameters like instance type, AMI, subnet ID, security group ID, etc.
Use Terraform modules for better organization and reusability
Leverage Terraform state file to track infrastructure changes
Q91. what is inheritace
Inheritance is the process by which genetic information is passed from parent to offspring, determining traits and characteristics.
Inheritance involves the transmission of genes from one generation to the next
Traits and characteristics of offspring are determined by the combination of genes inherited from both parents
Inheritance can lead to the expression of dominant or recessive traits
Examples include eye color, blood type, and genetic disorders
Q92. Any idea about Cloud
Cloud refers to the delivery of computing services over the internet.
Cloud computing allows users to access data and applications from anywhere with an internet connection.
It offers scalability, flexibility, and cost savings compared to traditional on-premise solutions.
Examples of cloud services include Amazon Web Services, Microsoft Azure, and Google Cloud Platform.
Q93. Any idea about AWS
AWS is a cloud computing platform provided by Amazon.
AWS stands for Amazon Web Services
It provides a wide range of cloud computing services such as storage, computing power, database management, and more
It is used by individuals, businesses, and governments worldwide
Some popular AWS services include EC2, S3, RDS, and Lambda
Q94. Java Project Experience
I have experience working on Java projects in various industries.
Developed a web application using Java Spring framework
Implemented RESTful APIs for data retrieval and manipulation
Utilized Java libraries like Apache POI for Excel file processing
Q95. what is batch apex
Batch Apex is a Salesforce feature that allows for the processing of large volumes of records in chunks.
Batch Apex is used to handle large data volumes that would exceed normal processing limits.
It breaks down the records into manageable chunks for processing.
Batch Apex jobs can be scheduled to run at specific times or can be run manually.
Example: Using Batch Apex to update all account records in Salesforce.
Q96. page break in smart form
Page break in smart form allows for better organization and layout of content.
Use the command 'NEW-PAGE' in the smart form to insert a page break.
Page breaks can be triggered based on conditions or manually inserted.
Page breaks help in separating content logically and improving readability.
Q97. What is incident
An incident is an unplanned event that disrupts normal operations and requires immediate attention to resolve.
An incident can be a hardware or software failure
It can also be a security breach or data loss
Examples include server crashes, network outages, and malware infections
Q98. What is problem
A problem is an issue or obstacle that needs to be solved or addressed.
A problem can arise from technical issues, errors in code, hardware malfunctions, or network failures.
Identifying the root cause of a problem is crucial in finding a solution.
Effective problem-solving skills involve analyzing the situation, brainstorming possible solutions, and implementing the best course of action.
Examples: troubleshooting a server outage, resolving software bugs, fixing network connecti...read more
Q99. Explain Jenkins pipeline
Jenkins pipeline is a set of automated steps to build, test, and deploy code.
Jenkins pipeline is defined using a Jenkinsfile, which can be written in either Declarative or Scripted syntax.
It allows for defining multiple stages, each containing one or more steps to be executed sequentially.
Pipeline can be triggered manually or automatically based on events like code commits or scheduled builds.
Pipeline can integrate with version control systems, testing frameworks, and deploym...read more
Q100. OOPs concept in java
OOPs concept in Java refers to Object-Oriented Programming principles like encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: Bundling data and methods that operate on the data into a single unit (object).
Inheritance: Allows a class to inherit properties and behavior from another class.
Polymorphism: Ability of a method to do different things based on the object it is acting upon.
Abstraction: Hiding the implementation details and showing only the necessar...read more
Interview Process at YASH Technologies

Top Interview Questions from Similar Companies








Reviews
Interviews
Salaries
Users/Month

