Add office photos
YASH Technologies logo
Engaged Employer

YASH Technologies

Verified
3.8
based on 1.6k Reviews
Video summary
Filter interviews by

100+ YASH Technologies Interview Questions and Answers

Updated 11 Feb 2025
Popular Designations

Q1. 1) describe the Cloud architecture for the azure storage, blob , cloud services? 2) describe the integration of Web API related questions for email and sms applications? 3) describe the .net core aspects for so...

read more
Ans.

Answers to interview questions for Module Lead position

  • 1) Azure storage architecture includes Blob storage and Cloud Services

  • 2) Web API integration for email and SMS applications involves sending requests to the API endpoints

  • 3) .NET Core aspects for solid programming implementation and integration concepts include dependency injection and middleware

  • 4) Encryption is the process of converting data into a secure form, while encoding is the process of converting data into a speci...read more

View 1 answer
right arrow

Q2. What is GCD? Explain in details

Ans.

GCD stands for Greatest Common Divisor. It is the largest positive integer that divides two or more numbers without leaving a remainder.

  • GCD is used to find the highest common factor between two or more numbers.

  • It is often used in mathematical calculations and algorithms.

  • GCD can be calculated using various methods like Euclidean algorithm or prime factorization.

  • Example: GCD of 12 and 18 is 6, as 6 is the largest number that divides both 12 and 18 without leaving a remainder.

View 2 more answers
right arrow

Q3. How different microservices communicate with each other

Ans.

Microservices communicate with each other through APIs, message queues, or event-driven architecture.

  • APIs: Microservices can communicate with each other through RESTful APIs or GraphQL.

  • Message queues: Services can use message brokers like RabbitMQ or Kafka to send and receive messages.

  • Event-driven architecture: Services can publish events to a message broker and subscribe to events they are interested in.

  • Service discovery: Services can use tools like Consul or Eureka to disco...read more

Add your answer
right arrow

Q4. How to handle http requests in Spring Boot

Ans.

Handling http requests in Spring Boot involves creating controller classes, mapping endpoints, and using annotations like @RestController and @RequestMapping.

  • Create a controller class with @RestController annotation

  • Map endpoints using @RequestMapping annotation

  • Use @GetMapping, @PostMapping, @PutMapping, @DeleteMapping annotations for specific HTTP methods

  • Inject dependencies using @Autowired annotation

Add your answer
right arrow
Discover YASH Technologies interview dos and don'ts from real experiences

Q5. Where will be microservices deployed in AWS

Ans.

Microservices can be deployed in AWS using services like ECS, EKS, Lambda, or Fargate.

  • Microservices can be deployed on AWS Elastic Container Service (ECS) for containerized applications.

  • AWS Elastic Kubernetes Service (EKS) can be used for deploying microservices using Kubernetes.

  • Serverless microservices can be deployed using AWS Lambda.

  • AWS Fargate provides serverless compute for containers, allowing for easy deployment of microservices.

Add your answer
right arrow

Q6. how to create primary key through programming

Ans.

Primary key can be created through programming by using SQL commands or ORM frameworks.

  • Use SQL commands like CREATE TABLE to define primary key constraints

  • Use ORM frameworks like Hibernate to define primary key annotations

  • Primary key can be a single column or a combination of columns

  • Primary key ensures uniqueness and helps in faster data retrieval

Add your answer
right arrow
Are these interview questions helpful?

Q7. How to find duplicate in unsorted array

Ans.

Use a hash set to keep track of seen elements and identify duplicates in an unsorted array of strings.

  • Iterate through the array and add each element to a hash set.

  • If an element is already in the hash set, it is a duplicate.

  • Example: ['apple', 'banana', 'apple', 'orange'] => 'apple' is a duplicate.

Add your answer
right arrow

Q8. Enum dictionary sets array explain

Ans.

Enum dictionary sets array of strings

  • An enum is a set of named values

  • A dictionary maps keys to values

  • An array is a collection of elements

  • The enum values can be used as keys in the dictionary to map to an array of strings

Add your answer
right arrow
Share interview questions and help millions of jobseekers 🌟
man with laptop

Q9. Difference between Structure VS class

Ans.

Structures are value types while classes are reference types.

  • Structures are allocated on stack while classes are allocated on heap.

  • Structures do not support inheritance while classes do.

  • Structures cannot have destructors while classes can.

  • Structures are used for small data structures while classes are used for larger, more complex objects.

  • Example of structure: struct Point { int x, y; }

  • Example of class: class Person { string name; int age; }

Add your answer
right arrow

Q10. What is Streams in java8

Ans.

Streams in Java 8 provide a way to process collections of objects in a functional style.

  • Streams allow for functional-style operations on collections, such as map, filter, and reduce.

  • Streams can be sequential or parallel, allowing for efficient processing of large datasets.

  • Streams do not store elements, they are processed on-demand as needed.

  • Example: List names = Arrays.asList("Alice", "Bob", "Charlie"); Stream stream = names.stream();

Add your answer
right arrow

Q11. How the Hashmap works

Ans.

Hashmap is a data structure that stores key-value pairs and allows for quick retrieval of values based on keys.

  • Hashmap uses a hash function to map keys to indices in an array.

  • Collisions can occur when multiple keys hash to the same index, which can be resolved using techniques like chaining or open addressing.

  • Hashmap provides constant time complexity O(1) for insertion, deletion, and retrieval operations.

  • Example: HashMap map = new HashMap<>(); map.put("key1", 1); int value = ...read more

Add your answer
right arrow

Q12. Explain Solid principle?

Ans.

SOLID is a set of principles for object-oriented programming to make software more maintainable, scalable, and robust.

  • S - Single Responsibility Principle

  • O - Open-Closed Principle

  • L - Liskov Substitution Principle

  • I - Interface Segregation Principle

  • D - Dependency Inversion Principle

Add your answer
right arrow

Q13. Explain ARC with example?

Ans.

ARC is Automatic Reference Counting used in iOS to manage memory.

  • ARC is a memory management technique used in iOS development.

  • It automatically manages the memory of objects in an iOS app.

  • ARC keeps track of the number of references to an object and deallocates it when there are no more references.

  • Example: If an object is assigned to a variable, ARC increments the reference count by 1. If the variable is reassigned or goes out of scope, ARC decrements the reference count by 1.

  • A...read more

Add your answer
right arrow

Q14. 3.how will you read unstructured table and convert to structured table

Ans.

To read an unstructured table and convert it to a structured table, you can use OCR technology and data extraction techniques.

  • Use Optical Character Recognition (OCR) technology to extract text from the unstructured table.

  • Apply data extraction techniques such as regular expressions or keyword matching to identify and extract relevant information from the extracted text.

  • Organize the extracted data into a structured table format by assigning appropriate column headers and arrang...read more

View 1 answer
right arrow

Q15. Authentication vs Authorization

Ans.

Authentication verifies the identity of a user, while authorization determines what a user can access.

  • Authentication confirms the user's identity through credentials like passwords or biometrics.

  • Authorization determines the user's permissions and access levels to resources.

  • Example: Logging into a system with a username and password is authentication. Being able to view certain files based on your role is authorization.

Add your answer
right arrow

Q16. Exception handling in spring boot

Ans.

Exception handling in Spring Boot involves using @ControllerAdvice, @ExceptionHandler, and ResponseEntity.

  • Use @ControllerAdvice to define global exception handling for all controllers

  • Use @ExceptionHandler to handle specific exceptions in individual controllers

  • Return ResponseEntity with appropriate status codes and error messages

Add your answer
right arrow

Q17. In angular how we can pass data parent to child.

Ans.

In Angular, data can be passed from parent to child components using @Input decorator.

  • Use @Input decorator in the child component to receive data from the parent component

  • Define a property in the child component with @Input decorator and assign the value passed from the parent component

  • Parent component should bind the data to the child component using property binding in the template

Add your answer
right arrow

Q18. 1.how can you save double values in asset

Ans.

Double values can be saved in assets by converting them to string format.

  • Convert the double value to a string using the appropriate method or function.

  • Save the string value in the asset.

  • When retrieving the value from the asset, convert the string back to a double using the appropriate method or function.

View 1 answer
right arrow

Q19. diff b/w get and load method in hibernate

Ans.

get() method returns null if the object is not found in the database, while load() method throws an exception.

  • get() method is eager loading while load() method is lazy loading.

  • get() method hits the database immediately while load() method hits the database only when the object is accessed.

  • get() method returns a proxy object while load() method returns a real object.

  • get() method is used when we are not sure if the object exists in the database while load() method is used when ...read more

Add your answer
right arrow

Q20. Find the 2nd Highest salary using sql query

Ans.

Use SQL query with ORDER BY and LIMIT to find 2nd highest salary.

  • Use SELECT statement to retrieve salary column

  • Use ORDER BY clause to sort salaries in descending order

  • Use LIMIT 1,1 to skip the highest salary and retrieve the 2nd highest salary

Add your answer
right arrow

Q21. What is the architecture of the project

Ans.

The project follows a microservices architecture.

  • The project is divided into small, independent services that communicate with each other through APIs.

  • Each service is responsible for a specific task or functionality.

  • The architecture allows for scalability, flexibility, and easier maintenance.

  • Examples of microservices used in the project include user management, payment processing, and inventory management.

View 1 answer
right arrow

Q22. Tell me about the Business Partner functionality in SAP

Ans.

Business Partner functionality in SAP is used to manage all types of business partners in a single system.

  • Business Partner is a central master data record that contains all relevant information about a customer, vendor, or any other type of business partner.

  • It allows for a 360-degree view of the business partner, including contact information, payment terms, credit limits, and transaction history.

  • Business Partner functionality can be used in various SAP modules such as Sales ...read more

Add your answer
right arrow

Q23. Tell the Configuration steps to run the APP in SAP

Ans.

The configuration steps to run the APP in SAP involve defining the payment methods, creating house banks, setting up payment program variants, and configuring the payment medium formats.

  • Define payment methods in the system

  • Create house banks and assign them to company codes

  • Set up payment program variants

  • Configure the payment medium formats

  • Define payment methods per country

  • Assign payment methods to company codes

  • Define bank determination rules

  • Configure the payment program parame...read more

View 1 answer
right arrow

Q24. 2.How will you get particular cell value from data table

Ans.

Use 'DataTable.Rows' property to get particular cell value from data table.

  • Use 'DataTable.Rows' property to get the rows of the data table.

  • Use 'DataRow.ItemArray' property to get the values of all the cells in a row.

  • Use 'DataRow.Item' property to get the value of a particular cell in a row by specifying the column name or index.

Add your answer
right arrow

Q25. what is App Center and how to use

Ans.

App Center is a mobile app development platform that helps build, test, and distribute apps.

  • It offers features like crash reporting, analytics, and push notifications.

  • Developers can integrate App Center with their code repositories and CI/CD pipelines.

  • It supports multiple platforms including iOS, Android, and Windows.

  • App Center also provides a marketplace for third-party services and plugins.

  • Examples of companies using App Center include Microsoft, Adobe, and Honeywell.

Add your answer
right arrow

Q26. 3) diff between soap and rest principles

Ans.

SOAP is a protocol while REST is an architectural style for web services.

  • SOAP is XML-based while REST uses JSON or XML.

  • SOAP requires more bandwidth and processing power than REST.

  • SOAP has built-in error handling while REST relies on HTTP error codes.

  • SOAP supports both stateful and stateless communication while REST is stateless.

  • SOAP is more secure than REST due to its built-in security features.

  • Examples of SOAP-based web services include Amazon Web Services and eBay.

  • Examples ...read more

Add your answer
right arrow

Q27. Find the 2nd largest number using Java 8

Ans.

Use Java 8 streams to find the 2nd largest number in an array.

  • Convert the array to a stream using Arrays.stream()

  • Sort the stream in descending order using sorted()

  • Skip the first element (largest number) using skip(1)

  • Find and return the first element of the remaining stream

Add your answer
right arrow

Q28. explain Behaviors , Custom renderers and triggers

Ans.

Behaviors, custom renderers, and triggers are tools used in Xamarin.Forms to customize the appearance and behavior of controls.

  • Behaviors allow you to add functionality to controls without subclassing them.

  • Custom renderers allow you to create platform-specific renderers for controls.

  • Triggers allow you to change the appearance or behavior of controls based on certain conditions.

  • Behaviors and triggers can be used together to create complex interactions.

  • Custom renderers are often...read more

Add your answer
right arrow

Q29. How to Unit test the app

Ans.

Unit testing involves testing individual units of code to ensure they function as expected.

  • Identify the units of code to be tested

  • Write test cases for each unit

  • Execute the tests and analyze the results

  • Use testing frameworks like JUnit or NUnit

  • Mock dependencies to isolate the unit being tested

  • Test for edge cases and error handling

  • Ensure code coverage is sufficient

Add your answer
right arrow

Q30. what all native features developed

Ans.

Several native features have been developed.

  • Native camera app with advanced features

  • Built-in voice assistant with natural language processing

  • Gesture-based navigation system

  • Screen recording and screenshot tools

  • Biometric authentication options

  • Augmented reality capabilities

Add your answer
right arrow

Q31. Mock calls and how you initiate call and convince thr prospects

Ans.

Initiating mock calls involves thorough research, clear communication, and effective persuasion techniques.

  • Research the prospect's background and needs before the call.

  • Introduce yourself and the purpose of the call in a friendly and professional manner.

  • Highlight the benefits of your product or service that align with the prospect's needs.

  • Handle objections confidently and provide solutions to address their concerns.

  • Close the call by summarizing key points and setting up a foll...read more

Add your answer
right arrow

Q32. What is MVVM and types

Ans.

MVVM stands for Model-View-ViewModel. It is a design pattern used in software engineering.

  • MVVM separates the user interface from the business logic

  • Model represents the data and business logic

  • View represents the user interface

  • ViewModel acts as a mediator between the Model and View

  • Types of MVVM include Classic MVVM, Prism MVVM, and ReactiveUI MVVM

Add your answer
right arrow

Q33. how to add push notifications

Ans.

To add push notifications, you need to integrate a push notification service into your app.

  • Choose a push notification service provider such as Firebase Cloud Messaging or OneSignal

  • Integrate the push notification SDK into your app

  • Register your app with the push notification service provider

  • Create a server-side API to send push notifications to your app

  • Handle push notifications in your app's code

Add your answer
right arrow

Q34. Posting Period And Fiscal Year Varients importance in SAP

Ans.

Posting period and fiscal year variants are important in SAP for accurate financial reporting and compliance.

  • Posting period variant determines the number of posting periods in a fiscal year

  • Fiscal year variant defines the start and end dates of a fiscal year

  • Both variants are used to ensure accurate financial reporting and compliance with legal requirements

  • Different countries may have different fiscal year variants, such as calendar year or April to March

  • Posting periods can be ...read more

Add your answer
right arrow

Q35. Sort the names using Java 8

Ans.

Using Java 8, sort an array of strings containing names.

  • Use the Arrays.sort() method with a lambda expression to sort the array of strings.

  • Example: String[] names = {"Alice", "Bob", "Charlie"}; Arrays.sort(names, (a, b) -> a.compareTo(b));

  • Print the sorted names array to see the result.

Add your answer
right arrow

Q36. what is xamarin profiler

Ans.

Xamarin Profiler is a tool for analyzing and optimizing the performance of Xamarin apps.

  • Xamarin Profiler helps identify memory leaks, CPU usage, and other performance issues

  • It can be used with both iOS and Android apps

  • The tool provides detailed reports and visualizations to help developers optimize their code

  • Xamarin Profiler is available as part of the Visual Studio Enterprise subscription

Add your answer
right arrow

Q37. What all design patterns used

Ans.

Multiple design patterns were used including Singleton, Factory, and Observer.

  • Singleton pattern was used to ensure only one instance of a class is created.

  • Factory pattern was used to create objects without exposing the creation logic.

  • Observer pattern was used to notify objects of any changes in state.

  • Other patterns such as Decorator and Adapter were also used in specific cases.

Add your answer
right arrow

Q38. Which exception occurred while modify Collection object

Ans.

ConcurrentModificationException occurs while modifying a Collection object.

  • Occurs when a collection is modified while iterating over it

  • Thrown by methods like add, remove, clear, etc. during iteration

  • Can be avoided by using Iterator's remove method instead of Collection's remove method

Add your answer
right arrow

Q39. what is messaging center

Ans.

Messaging center is a platform for sending and receiving messages between users or systems.

  • It allows users to communicate with each other through messages.

  • It can be used for notifications, alerts, and updates.

  • Messaging center can be integrated with other systems or applications.

  • Examples include email, chat applications, and social media messaging.

  • It can also be used for automated messaging, such as appointment reminders or order confirmations.

Add your answer
right arrow

Q40. what is exception handling

Ans.

Exception handling is the process of handling errors and unexpected events in a program.

  • It allows a program to gracefully handle errors and prevent crashes.

  • It involves catching and handling exceptions using try-catch blocks.

  • Common exceptions include null pointer exceptions and arithmetic exceptions.

  • Exception handling can improve the reliability and robustness of a program.

Add your answer
right arrow

Q41. How devops works for xamarin

Ans.

DevOps for Xamarin involves continuous integration, delivery, and deployment of mobile apps.

  • Automated builds and testing using tools like Visual Studio App Center

  • Continuous delivery through app store publishing and distribution

  • Monitoring and logging for app performance and user feedback

  • Collaboration between development and operations teams for seamless app delivery

Add your answer
right arrow

Q42. Advantages and disadvantages of Xamarin

Ans.

Xamarin is a cross-platform app development tool that allows developers to build native apps for iOS, Android, and Windows using C#.

  • Advantages:

  • - Code sharing across multiple platforms

  • - Native performance

  • - Access to native APIs

  • - Large community support

  • - Integration with Visual Studio

  • Disadvantages:

  • - Limited access to some platform-specific features

  • - Large app size

  • - Requires knowledge of C#

  • - Licensing fees for enterprise use

  • - Limited third-party library support

  • - Debugging can be...read more

Add your answer
right arrow

Q43. SAP Related process and what are challenges faced during project execution.

Ans.

SAP related processes and challenges during project execution

  • SAP processes involve integrating various modules like finance, sales, and production

  • Challenges include complex system configuration, data migration, and user training

  • Managing stakeholder expectations and ensuring smooth integration with existing systems

  • Dealing with customization requirements and potential scope creep

  • Addressing technical issues and ensuring system stability

Add your answer
right arrow

Q44. Explain OOPs and Solid Principles

Ans.

OOPs is a programming paradigm that focuses on objects and their interactions. SOLID principles are a set of guidelines for OOP design.

  • OOPs stands for Object-Oriented Programming

  • It emphasizes on objects and their interactions

  • SOLID principles are a set of guidelines for OOP design

  • SOLID stands for Single Responsibility, Open-Closed, Liskov Substitution, Interface Segregation, and Dependency Inversion

  • Single Responsibility Principle (SRP) states that a class should have only one ...read more

Add your answer
right arrow

Q45. How u manage this MNC environment?

Ans.

I manage the MNC environment by understanding the company culture, building relationships, and adapting to changes.

  • Understand the company culture and values

  • Build strong relationships with colleagues and stakeholders

  • Adapt to changes in the organization

  • Stay up-to-date with industry trends and best practices

  • Communicate effectively with team members and management

Add your answer
right arrow

Q46. What is the table associated with invoice

Ans.

The table associated with invoice is VBRK (Billing Document: Header Data)

  • VBRK table stores header data for billing documents

  • Contains information such as invoice number, date, amount, etc.

  • Linked to other tables like VBRP (Billing Document: Item Data) for line item details

Add your answer
right arrow

Q47. Explain Boxing vs UnBoxing

Ans.

Boxing is the process of converting a value type to a reference type, while unboxing is the opposite process.

  • Boxing is used when a value type needs to be treated as an object, such as when passing it as a parameter to a method that expects an object.

  • Unboxing is used when retrieving the value of a boxed object.

  • Boxing and unboxing can have performance implications and should be used judiciously.

  • Example: int i = 42; object o = i; // boxing int j = (int)o; // unboxing

View 1 answer
right arrow

Q48. What are difffent wen api response types

Ans.

Different types of API response include JSON, XML, HTML, and plain text.

  • JSON: Lightweight data interchange format commonly used in APIs.

  • XML: Markup language for encoding documents in a format that is both human-readable and machine-readable.

  • HTML: Standard markup language for creating web pages.

  • Plain text: Simple text format without any formatting or structure.

Add your answer
right arrow

Q49. How do you create a user account in AD?

Ans.

To create a user account in AD, follow these steps:

  • Open Active Directory Users and Computers

  • Right-click on the domain and select 'New' and then 'User'

  • Enter the user's information, such as name and password

  • Click 'Next' and then 'Finish' to create the account

Add your answer
right arrow

Q50. what are the business process involve in sap pp

Ans.

SAP PP involves business processes related to production planning and control.

  • Creation of production orders

  • Material requirement planning

  • Capacity planning

  • Shop floor execution

  • Production scheduling

Add your answer
right arrow

Q51. Explain dependency injection.

Ans.

Dependency injection is a design pattern where components are provided with their dependencies rather than creating them internally.

  • Dependency injection helps in achieving loose coupling between components.

  • It allows for easier testing by providing mock dependencies.

  • There are three types of dependency injection: constructor injection, setter injection, and interface injection.

Add your answer
right arrow
Asked in
SAL Interview

Q52. what are the different types of asynchronous apex

Ans.

Different types of asynchronous apex include future methods, queueable interface, and batch apex.

  • Future methods allow for running code asynchronously in the background.

  • Queueable interface allows for chaining jobs and running them in a specific order.

  • Batch apex is used for processing large data sets in smaller, manageable chunks.

Add your answer
right arrow

Q53. Abstraction vs Encapsulation

Ans.

Abstraction focuses on hiding unnecessary details while encapsulation focuses on hiding implementation details.

  • Abstraction is about showing only the necessary details to the user while hiding the rest.

  • Encapsulation is about wrapping data and methods into a single unit and restricting access to the internal details.

  • Abstraction is achieved through abstract classes and interfaces.

  • Encapsulation is achieved through access modifiers like private, public, and protected.

  • Abstraction i...read more

Add your answer
right arrow

Q54. How will you manage SAP in a clothing business

Ans.

To manage SAP in a clothing business, you need to focus on key areas such as inventory management, sales order processing, pricing, and customer management.

  • Implement SAP SD module to handle sales and distribution processes

  • Set up and maintain master data for products, customers, and pricing conditions

  • Manage inventory levels and ensure accurate stock availability

  • Process sales orders, including order entry, delivery, and billing

  • Monitor and analyze sales performance and customer ...read more

Add your answer
right arrow

Q55. Tell me something about react and angular

Ans.

React and Angular are popular JavaScript frameworks used for building user interfaces.

  • React is a JavaScript library developed by Facebook.

  • React uses a virtual DOM to efficiently update the user interface.

  • React components are reusable and can be composed to build complex UIs.

  • React follows a unidirectional data flow.

  • Angular is a TypeScript-based open-source framework developed by Google.

  • Angular uses a two-way data binding approach.

  • Angular provides a comprehensive set of tools a...read more

Add your answer
right arrow

Q56. print cube of all the numbers in given range?

Ans.

Use a loop to calculate the cube of each number in the given range and print the result.

  • Use a for loop to iterate through the range of numbers

  • Calculate the cube of each number using the formula cube = number * number * number

  • Print the cube of each number

Add your answer
right arrow

Q57. What is Dynamic host configuration protocol

Ans.

Dynamic Host Configuration Protocol (DHCP) is a network management protocol used to dynamically assign IP addresses and other network configuration parameters to devices on a network.

  • DHCP automates the IP address configuration process, reducing the need for manual intervention.

  • DHCP servers assign IP addresses from a pool of available addresses, ensuring that no two devices have the same IP address.

  • DHCP also provides other network configuration information such as subnet mask,...read more

Add your answer
right arrow

Q58. Difference between on change and at first

Ans.

On change triggers when a field value is modified, while at first triggers when a field is first loaded or displayed.

  • On change is used for real-time validation or calculations based on user input

  • At first is used for initializing values or performing actions when a field is loaded

  • Example: On change can be used to calculate total price when quantity is changed, while at first can be used to set default values when a form is loaded

Add your answer
right arrow

Q59. Zero Cybersecurity Projects in Yash Technologies

Ans.

Yash Technologies does not have any ongoing cybersecurity projects.

  • Yash Technologies currently does not have any cybersecurity projects in progress.

  • It is possible that Yash Technologies may focus on other areas of expertise besides cybersecurity.

  • The company may prioritize different types of projects over cybersecurity initiatives.

Add your answer
right arrow

Q60. Bad Leadership with Zero Cybersecurity Skills

Ans.

Bad leadership with zero cybersecurity skills can lead to serious security vulnerabilities and risks for the organization.

  • Lack of understanding of cybersecurity threats and best practices can result in poor decision-making regarding security measures.

  • Failure to prioritize cybersecurity can leave the organization vulnerable to cyber attacks and data breaches.

  • Ineffective communication and guidance from leadership can hinder the implementation of proper cybersecurity protocols.

  • E...read more

Add your answer
right arrow

Q61. How to debug sql proc

Ans.

Debugging SQL procedures involves using print statements, logging, and step-by-step execution.

  • Use print statements to output variable values at different stages of the procedure.

  • Enable logging to track the flow of the procedure and identify any errors.

  • Execute the procedure step-by-step to pinpoint the exact location of the issue.

  • Use tools like SQL Server Management Studio to debug stored procedures.

  • Check for syntax errors and ensure proper error handling within the procedure.

Add your answer
right arrow

Q62. sort a list without inbuilt keyword?

Ans.

Sort a list without using inbuilt keyword

  • Iterate through the list and compare each element with the rest to find the smallest element

  • Swap the smallest element with the first element

  • Repeat the process for the remaining elements until the list is sorted

Add your answer
right arrow

Q63. What is accounts receivable?

Ans.

Accounts receivable is the money owed to a company by its customers for goods or services provided on credit.

  • Accounts receivable represents the amount of money owed to a company by its customers.

  • It is considered an asset on the company's balance sheet.

  • Companies often offer credit terms to customers, allowing them to pay for goods or services at a later date.

  • Examples include invoices sent to customers for products or services rendered.

  • Monitoring accounts receivable is importan...read more

Add your answer
right arrow

Q64. What are planning types

Ans.

Planning types refer to the different approaches or methods used to create a plan for achieving a goal or objective.

  • There are several planning types, including strategic planning, operational planning, tactical planning, contingency planning, and crisis planning.

  • Strategic planning involves setting long-term goals and developing a plan to achieve them.

  • Operational planning focuses on the day-to-day activities required to achieve the goals set out in the strategic plan.

  • Tactical ...read more

Add your answer
right arrow

Q65. what are the 7 osi model?

Ans.

The 7 layers of the OSI model are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Physical layer - deals with physical connections and signals

  • Data Link layer - responsible for node-to-node communication

  • Network layer - handles routing and forwarding

  • Transport layer - ensures end-to-end communication

  • Session layer - manages sessions between applications

  • Presentation layer - translates data into a format that the application layer can understand

  • Appl...read more

Add your answer
right arrow

Q66. What is Profiles and Permission set

Ans.

Profiles and Permission sets are used in Salesforce to control access and permissions for users.

  • Profiles define the settings and permissions for a user, such as object and field access, record types, and page layouts.

  • Permission sets are used to grant additional permissions to users, without changing their profile.

  • Profiles are assigned to users when they are created, while permission sets can be assigned or revoked at any time.

  • Profiles and permission sets work together to ensu...read more

Add your answer
right arrow

Q67. is tuple fully immutable?

Ans.

Yes, tuples are fully immutable in Python.

  • Tuples cannot be modified once created.

  • Elements of a tuple cannot be changed, added, or removed.

  • Attempting to modify a tuple will result in a TypeError.

  • Example: tuple1 = (1, 2, 3) - tuple1[0] = 4 will raise a TypeError.

Add your answer
right arrow

Q68. what is docker used for?

Ans.

Docker is a platform used to develop, ship, and run applications in containers.

  • Docker allows developers to package their applications and dependencies into a container, which can then be easily shared and run on any system.

  • Containers created with Docker are lightweight, portable, and isolated from the host system, making them ideal for microservices architecture.

  • Docker simplifies the process of deploying and scaling applications, as well as ensuring consistency between develo...read more

Add your answer
right arrow

Q69. What is Active Directory?

Ans.

Active Directory is a Microsoft service that manages network resources and user accounts.

  • It provides centralized authentication and authorization for Windows-based computers.

  • It allows administrators to manage users, computers, and other network resources from a single location.

  • It uses a hierarchical structure of domains, trees, and forests to organize network resources.

  • It supports group policies that can be used to enforce security settings and other configurations.

  • It can int...read more

Add your answer
right arrow

Q70. what is TMG? TMG events

Ans.

TMG stands for Transport Management Guide. TMG events are used in SAP to control the flow of data during transport requests.

  • TMG is used in SAP to manage the transport of data between systems.

  • TMG events are used to trigger actions before and after the data is transported.

  • Examples of TMG events include BEFORE_IMPORT, AFTER_IMPORT, BEFORE_EXPORT, and AFTER_EXPORT.

Add your answer
right arrow

Q71. What is Service level aggriment

Ans.

A Service Level Agreement (SLA) is a contract between a service provider and its customers that defines the level of service expected.

  • SLA outlines the services provided, quality standards, responsibilities, and guarantees.

  • It sets the expectations for both the service provider and the customer.

  • It includes metrics for measuring service performance and penalties for not meeting the agreed-upon standards.

  • Examples of SLAs include response time for resolving issues, uptime guarante...read more

Add your answer
right arrow

Q72. Any idea about integration

Ans.

Integration refers to the process of combining different systems or applications to work together seamlessly.

  • Integration can improve efficiency and reduce errors by automating processes

  • APIs and middleware are commonly used for integration

  • Examples of integration include integrating a CRM system with a marketing automation platform

  • Integration can also refer to the process of merging two companies or departments

Add your answer
right arrow

Q73. What is DHCP and DNS?

Ans.

DHCP assigns IP addresses to devices on a network. DNS translates domain names to IP addresses.

  • DHCP stands for Dynamic Host Configuration Protocol

  • It automatically assigns IP addresses to devices on a network

  • DNS stands for Domain Name System

  • It translates domain names to IP addresses

  • DNS is used to locate websites and other resources on the internet

Add your answer
right arrow

Q74. Any idea about automation

Ans.

Automation is the use of technology to perform tasks without human intervention.

  • Automation can improve efficiency and reduce errors in tasks such as network monitoring and configuration management.

  • Tools like Ansible and Puppet can automate repetitive tasks and ensure consistency across systems.

  • Automation can also free up time for IT staff to focus on more strategic initiatives.

  • However, it's important to carefully plan and test automation to avoid unintended consequences.

  • Regul...read more

Add your answer
right arrow

Q75. How dispatcher servlet works?

Ans.

Dispatcher servlet in Spring MVC maps incoming requests to the appropriate handler

  • Dispatcher servlet is the front controller in Spring MVC

  • It receives all incoming requests and maps them to the appropriate handler

  • Handler mappings are defined in the configuration file

  • Dispatcher servlet uses HandlerMapping to determine the appropriate controller

  • Once the controller is determined, Dispatcher servlet forwards the request to it

Add your answer
right arrow

Q76. What is PST and OST?

Ans.

PST and OST are file formats used in Microsoft Outlook for storing email data.

  • PST stands for Personal Storage Table and is used to store email messages, contacts, calendar events, and other data in Microsoft Outlook.

  • OST stands for Offline Storage Table and is a local copy of an Exchange mailbox that allows users to access their email data even when they are not connected to the server.

  • PST files are typically used for POP3 and IMAP email accounts, while OST files are used for ...read more

View 1 answer
right arrow

Q77. How to modify Collection

Ans.

Collections in Java can be modified using methods like add, remove, and clear.

  • Use add() method to add elements to a collection

  • Use remove() method to remove elements from a collection

  • Use clear() method to remove all elements from a collection

Add your answer
right arrow

Q78. Dbcc commands and list them

Ans.

DBCC commands are used to check the consistency and integrity of a database.

  • DBCC CHECKDB - checks the logical and physical integrity of all objects in the specified database

  • DBCC CHECKTABLE - checks the integrity of all the pages and structures that make up the table

  • DBCC CHECKALLOC - checks the consistency of disk space allocation structures for a specified database

  • DBCC SHRINKDATABASE - shrinks the size of the specified database

  • DBCC SHRINKFILE - shrinks the size of the specifi...read more

Add your answer
right arrow

Q79. What is components of vpc

Ans.

Components of VPC include subnets, route tables, internet gateways, security groups, network access control lists, and VPN connections.

  • Subnets

  • Route tables

  • Internet gateways

  • Security groups

  • Network access control lists

  • VPN connections

Add your answer
right arrow

Q80. Explain any 3 design patterns

Ans.

Design patterns are reusable solutions to common problems in software design.

  • Singleton Pattern: Ensures a class has only one instance and provides a global point of access to it.

  • Factory Pattern: Creates objects without specifying the exact class of object that will be created.

  • Observer Pattern: Defines a one-to-many dependency between objects so that when one object changes state, all its dependents are notified and updated automatically.

Add your answer
right arrow

Q81. Tell about configuration

Ans.

Configuration refers to the process of setting up and customizing software or hardware to meet specific requirements.

  • Configuration involves setting up and customizing software or hardware

  • It is done to meet specific requirements

  • Examples include setting up a new computer or customizing software settings

Add your answer
right arrow

Q82. Trigger write with logic explanation

Ans.

A trigger write with logic explanation in software development.

  • Triggers are database objects that are automatically executed or fired when certain events occur in a database.

  • Triggers can be used to enforce business rules, validate input data, or maintain referential integrity.

  • Example: A trigger can be set up to automatically update a 'last_modified' timestamp whenever a record is updated in a table.

Add your answer
right arrow

Q83. What is strategic sourcing

Ans.

Strategic sourcing is a proactive approach to procurement that focuses on long-term value creation and supplier relationship management.

  • Strategic sourcing involves analyzing the organization's needs and identifying the best suppliers to meet those needs.

  • It aims to optimize costs, quality, and delivery by leveraging market intelligence and negotiating favorable contracts.

  • Strategic sourcing emphasizes long-term partnerships with suppliers to drive innovation and continuous impr...read more

Add your answer
right arrow

Q84. What is the s2p process

Ans.

The s2p process refers to the source-to-pay process, which encompasses all activities from sourcing suppliers to making payments.

  • The s2p process involves identifying and selecting suppliers.

  • It includes negotiating contracts and pricing with suppliers.

  • It also involves managing supplier relationships and performance.

  • The process includes requisitioning, ordering, and receiving goods or services.

  • It encompasses invoice processing and payment to suppliers.

  • Examples of tools used in ...read more

Add your answer
right arrow

Q85. what are html tags.

Ans.

HTML tags are used to define the structure and content of a web page.

  • HTML tags are enclosed in angle brackets, like <tag>.

  • They are used to define elements such as headings, paragraphs, images, links, etc.

  • Tags usually come in pairs - an opening tag <tag> and a closing tag </tag>.

  • Some tags are self-closing, like <img src='image.jpg' />.

  • Attributes can be added to tags to provide additional information, like <a href='https://www.example.com'>Link</a>.

Add your answer
right arrow

Q86. Any idea about Azure

Ans.

Azure is a cloud computing platform by Microsoft.

  • Azure offers a wide range of services including virtual machines, storage, and databases.

  • It allows users to build, deploy, and manage applications and services through a global network of Microsoft-managed data centers.

  • Azure also provides tools for analytics, machine learning, and Internet of Things (IoT) applications.

  • Some popular Azure services include Azure Virtual Machines, Azure SQL Database, and Azure App Service.

  • Azure is ...read more

Add your answer
right arrow

Q87. What is constructor?

Ans.

A constructor is a special type of method that is used to initialize objects in a class.

  • Constructors have the same name as the class they belong to.

  • They do not have a return type.

  • Constructors are called automatically when an object is created.

  • They can be used to set initial values for object attributes.

Add your answer
right arrow

Q88. Revenue Target in last 3 years

Ans.

Achieved revenue targets consistently over the past 3 years.

  • Exceeded revenue targets by 10% in 2018

  • Met revenue targets in 2019

  • Surpassed revenue targets by 15% in 2020

Add your answer
right arrow

Q89. Design pattern if any 2

Ans.

Two design patterns are Singleton and Observer.

  • Singleton pattern ensures only one instance of a class exists.

  • Observer pattern allows objects to be notified of changes in another object.

  • Singleton can be implemented using lazy initialization or eager initialization.

  • Observer pattern can be used in event-driven systems or GUI frameworks.

  • Example of Singleton: Database connection manager.

  • Example of Observer: GUI components listening to changes in a model.

Add your answer
right arrow

Q90. Terraform code for ec2 and vpc

Ans.

Terraform code for creating EC2 instance and VPC

  • Use Terraform resources 'aws_instance' for EC2 and 'aws_vpc' for VPC

  • Specify necessary parameters like instance type, AMI, subnet ID, security group ID, etc.

  • Use Terraform modules for better organization and reusability

  • Leverage Terraform state file to track infrastructure changes

Add your answer
right arrow

Q91. what is inheritace

Ans.

Inheritance is the process by which genetic information is passed from parent to offspring, determining traits and characteristics.

  • Inheritance involves the transmission of genes from one generation to the next

  • Traits and characteristics of offspring are determined by the combination of genes inherited from both parents

  • Inheritance can lead to the expression of dominant or recessive traits

  • Examples include eye color, blood type, and genetic disorders

Add your answer
right arrow

Q92. Any idea about Cloud

Ans.

Cloud refers to the delivery of computing services over the internet.

  • Cloud computing allows users to access data and applications from anywhere with an internet connection.

  • It offers scalability, flexibility, and cost savings compared to traditional on-premise solutions.

  • Examples of cloud services include Amazon Web Services, Microsoft Azure, and Google Cloud Platform.

Add your answer
right arrow

Q93. Any idea about AWS

Ans.

AWS is a cloud computing platform provided by Amazon.

  • AWS stands for Amazon Web Services

  • It provides a wide range of cloud computing services such as storage, computing power, database management, and more

  • It is used by individuals, businesses, and governments worldwide

  • Some popular AWS services include EC2, S3, RDS, and Lambda

Add your answer
right arrow

Q94. Java Project Experience

Ans.

I have experience working on Java projects in various industries.

  • Developed a web application using Java Spring framework

  • Implemented RESTful APIs for data retrieval and manipulation

  • Utilized Java libraries like Apache POI for Excel file processing

Add your answer
right arrow
Asked in
SAL Interview

Q95. what is batch apex

Ans.

Batch Apex is a Salesforce feature that allows for the processing of large volumes of records in chunks.

  • Batch Apex is used to handle large data volumes that would exceed normal processing limits.

  • It breaks down the records into manageable chunks for processing.

  • Batch Apex jobs can be scheduled to run at specific times or can be run manually.

  • Example: Using Batch Apex to update all account records in Salesforce.

Add your answer
right arrow

Q96. page break in smart form

Ans.

Page break in smart form allows for better organization and layout of content.

  • Use the command 'NEW-PAGE' in the smart form to insert a page break.

  • Page breaks can be triggered based on conditions or manually inserted.

  • Page breaks help in separating content logically and improving readability.

Add your answer
right arrow

Q97. What is incident

Ans.

An incident is an unplanned event that disrupts normal operations and requires immediate attention to resolve.

  • An incident can be a hardware or software failure

  • It can also be a security breach or data loss

  • Examples include server crashes, network outages, and malware infections

Add your answer
right arrow

Q98. What is problem

Ans.

A problem is an issue or obstacle that needs to be solved or addressed.

  • A problem can arise from technical issues, errors in code, hardware malfunctions, or network failures.

  • Identifying the root cause of a problem is crucial in finding a solution.

  • Effective problem-solving skills involve analyzing the situation, brainstorming possible solutions, and implementing the best course of action.

  • Examples: troubleshooting a server outage, resolving software bugs, fixing network connecti...read more

Add your answer
right arrow

Q99. Explain Jenkins pipeline

Ans.

Jenkins pipeline is a set of automated steps to build, test, and deploy code.

  • Jenkins pipeline is defined using a Jenkinsfile, which can be written in either Declarative or Scripted syntax.

  • It allows for defining multiple stages, each containing one or more steps to be executed sequentially.

  • Pipeline can be triggered manually or automatically based on events like code commits or scheduled builds.

  • Pipeline can integrate with version control systems, testing frameworks, and deploym...read more

Add your answer
right arrow

Q100. OOPs concept in java

Ans.

OOPs concept in Java refers to Object-Oriented Programming principles like encapsulation, inheritance, polymorphism, and abstraction.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit (object).

  • Inheritance: Allows a class to inherit properties and behavior from another class.

  • Polymorphism: Ability of a method to do different things based on the object it is acting upon.

  • Abstraction: Hiding the implementation details and showing only the necessar...read more

Add your answer
right arrow
1
2
Next
Contribute & help others!
Write a review
Write a review
Share interview
Share interview
Contribute salary
Contribute salary
Add office photos
Add office photos

Interview Process at YASH Technologies

based on 130 interviews
Interview experience
3.9
Good
View more
interview tips and stories logo
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

Amazon Logo
4.1
 • 2.2k Interview Questions
HCLTech Logo
3.5
 • 2.1k Interview Questions
SAP Logo
4.2
 • 367 Interview Questions
NeoSOFT Logo
3.7
 • 284 Interview Questions
American Express Logo
4.2
 • 191 Interview Questions
TVS Motor Logo
4.0
 • 137 Interview Questions
View all
Recently Viewed
INTERVIEWS
Skewb Analytics
No Interviews
INTERVIEWS
Atlas Copco
No Interviews
INTERVIEWS
Procter & Gamble
No Interviews
INTERVIEWS
Procter & Gamble
No Interviews
INTERVIEWS
YASH Technologies
No Interviews
INTERVIEWS
YASH Technologies
No Interviews
SALARIES
Technip Energies
INTERVIEWS
Fujitsu
No Interviews
INTERVIEWS
Skewb Analytics
No Interviews
INTERVIEWS
YASH Technologies
No Interviews
Top YASH Technologies Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
play-icon
play-icon
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter