Zensar Technologies
100+ Look My Cook Interview Questions and Answers
Q101. Difference in String and String Buffer OOPs concept Exceptional Handling
String is immutable, String Buffer is mutable. OOPs concept focuses on objects and classes. Exception handling is used to handle runtime errors.
String is immutable, meaning its value cannot be changed once it is created. String Buffer is mutable, allowing for modifications to the value.
OOPs concept revolves around the idea of objects and classes, where objects are instances of classes and encapsulate data and behavior.
Exception handling is used to handle runtime errors and pr...read more
Q102. Risky user identification and process to mitigate it.
Risky user identification involves analyzing user behavior and implementing measures to reduce potential risks.
Utilize user behavior analytics to identify unusual patterns or activities
Implement multi-factor authentication for sensitive actions
Regularly review user access permissions and revoke unnecessary privileges
Train employees on cybersecurity best practices to prevent risky behavior
Monitor user activity in real-time to quickly detect and respond to potential threats
Q103. Difference between having and where clause
Having clause is used with aggregate functions while where clause is used to filter rows
Having clause is used with GROUP BY to filter groups based on conditions
Where clause is used to filter rows based on conditions
Having clause is applied after grouping while where clause is applied before grouping
Example: SELECT department, AVG(salary) FROM employees GROUP BY department HAVING AVG(salary) > 50000
Example: SELECT * FROM employees WHERE department = 'IT'
Q104. What is the purpose of Guidewire in Insurance
Guidewire is a software platform used in the insurance industry to manage policies, claims, and billing processes.
Guidewire helps insurance companies streamline their operations and improve efficiency.
It provides tools for policy administration, claims management, billing, and underwriting.
Guidewire allows insurers to offer better customer service by automating processes and providing real-time data.
It helps insurers adapt to changing market conditions and regulations by prov...read more
Q105. Program to reverse a string.
Program to reverse a string.
Create an empty string to store the reversed string
Loop through the original string from end to start
Add each character to the new string
Return the new string
Q106. Backbase architecture as position for backbase developer
Backbase architecture is the foundation for developing applications using the Backbase platform.
Backbase architecture includes modules like Experience Manager, Portal Manager, and Forms.
Developers need to understand how these modules interact and communicate with each other.
Knowledge of RESTful APIs, microservices, and front-end technologies like AngularJS is essential for Backbase development.
Q107. SQL joins and types plus code situation examples
Understanding SQL joins and types with code examples
Types of SQL joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN
INNER JOIN returns rows when there is at least one match in both tables
LEFT JOIN returns all rows from the left table and the matched rows from the right table
RIGHT JOIN returns all rows from the right table and the matched rows from the left table
FULL JOIN returns rows when there is a match in one of the tables
Example: SELECT * FROM table1 INNER JOIN...read more
Q108. Who is father of C programming
Dennis Ritchie is considered the father of C programming.
Dennis Ritchie developed the C programming language at Bell Labs in the early 1970s.
C programming language became widely used and influenced many other programming languages.
Ritchie also co-authored the book 'The C Programming Language' with Brian Kernighan.
C programming language is known for its efficiency, flexibility, and low-level control.
Q109. Design for bruteforce method to address ondemand requirement
Bruteforce method for ondemand requirement design
Identify the problem and define the scope
Determine the possible inputs and outputs
Create a brute force algorithm to solve the problem
Optimize the algorithm to reduce time complexity
Test the algorithm with various inputs and edge cases
Q110. what is backup? Explain different types of normalization?
Backup is the process of creating a copy of data to protect against data loss.
Different types of backups include full, differential, and incremental backups.
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
There are different levels of normalization, including first normal form (1NF), second normal form (2NF), and third normal form (3NF).
Normalization helps to prevent data inconsistencies and anomalies.
Example: A cu...read more
Q111. OOPS concepts with writing code for them
OOPS concepts are fundamental to software development. They include inheritance, encapsulation, abstraction, and polymorphism.
Inheritance allows a class to inherit properties and methods from another class.
Encapsulation is the practice of hiding data and methods within a class, so they cannot be accessed from outside the class.
Abstraction is the process of simplifying complex systems by breaking them down into smaller, more manageable parts.
Polymorphism allows objects to take...read more
Q112. Adop phases during oracle apps patching?
ADOP (Application DBA Online Patching) has multiple phases during Oracle Apps patching.
Prepare phase - prepares the system for patching
Apply phase - applies the patches to the system
Finalize phase - finalizes the patching process
Cutover phase - switches the system to the new patch level
Cleanup phase - cleans up temporary files and logs
Q113. What are common data connectivity modes?
Common data connectivity modes include DirectQuery, Import, Live Connection, and Composite models.
DirectQuery allows querying data directly from the data source in real-time.
Import mode imports data into Power BI for faster performance but may not reflect real-time data.
Live Connection connects Power BI to a data source without importing data.
Composite models combine DirectQuery and Import modes for flexibility.
Q114. Language that you prefer
I prefer working with Java as it is a versatile language with a strong community and vast libraries.
Java is platform-independent and can be used for web development, mobile app development, and enterprise applications.
Java has a vast collection of libraries and frameworks like Spring, Hibernate, and Struts.
Java has a strong community and support system, making it easy to find solutions to problems.
Java is a statically typed language, which helps catch errors at compile-time.
J...read more
Q115. How to use zipkin in microservices
Zipkin is a distributed tracing system used to monitor microservices communication.
Add Zipkin dependencies to each microservice
Configure each microservice to send tracing data to Zipkin server
Use Zipkin UI to visualize and analyze the tracing data
Add trace IDs to logs for better debugging
Use Zipkin to identify performance bottlenecks and optimize microservices communication
Q116. Writing Rest API for the real time example
Writing a REST API for a real-time example
Choose a real-time example, such as a chat application or a stock market tracker
Design the API endpoints and their corresponding HTTP methods
Implement the API using a framework like Express.js or Django
Use WebSockets or long-polling for real-time updates
Ensure authentication and authorization mechanisms are in place
Handle error cases and provide appropriate error responses
Q117. Explain Spring Security flow in your project
Spring Security is used for authentication and authorization in Java projects.
Spring Security provides authentication and authorization support out of the box.
It can be configured using XML or Java configuration.
It supports various authentication mechanisms like form-based, basic, and OAuth.
Roles and permissions can be defined using annotations or configuration.
Example: @EnableWebSecurity annotation enables Spring Security in a project.
Q118. what is destructor
Destructor is a special member function in C++ that is called automatically when an object is destroyed.
Destructors have the same name as the class preceded by a tilde (~).
They are used to release resources allocated by the object during its lifetime.
Example: ~ClassName() { // destructor code }
Q119. Why .net core and Microservices
Using .NET Core and Microservices allows for scalable, modular, and efficient development of applications.
Increased scalability by breaking down applications into smaller, independent services
Modular architecture allows for easier maintenance and updates
Efficient resource utilization by only deploying necessary services
Support for cross-platform development with .NET Core
Q120. Siem content development and use cases example
Siem content development involves creating rules and use cases to detect and respond to security threats.
Developing custom rules to monitor for specific security events
Creating use cases to identify patterns of suspicious activity
Leveraging threat intelligence feeds to enhance detection capabilities
Q121. Step to safeguard if account got compromised.
Enable two-factor authentication, change passwords, monitor account activity.
Enable two-factor authentication for added security.
Change passwords regularly to prevent unauthorized access.
Monitor account activity for any suspicious behavior.
Notify the account provider immediately if account is compromised.
Q122. What is RLS and explain in detail
RLS stands for Row-Level Security, a feature in Power BI that restricts data access based on user roles.
RLS allows you to control which rows of data a user can access in a Power BI report or dashboard
You can define security roles and rules to filter data based on user attributes or roles
RLS helps in ensuring data privacy and compliance with regulations
For example, you can use RLS to restrict a sales manager to only see data related to their region
Q123. Technologies, frameworks and tools for planning RAID and RACI Matrix.
Technologies, frameworks, and tools for planning RAID and RACI Matrix
RAID Matrix: Risk Assessment and Identification Matrix used for project risk management
RACI Matrix: Responsible, Accountable, Consulted, and Informed Matrix used for defining roles and responsibilities in a project
Tools: Microsoft Excel, Google Sheets, Smartsheet, Trello, Asana
Frameworks: Agile, Scrum, Waterfall
Q124. Explain about exception
An exception is an event that disrupts the normal flow of a program's execution.
Exceptions are used to handle errors and other exceptional events in a program.
They can be caught and handled using try-catch blocks.
Common types of exceptions include NullPointerException, ArrayIndexOutOfBoundsException, and IOException.
Q125. What is your technology vision
My technology vision is to leverage cutting-edge tools and techniques to create innovative solutions that improve efficiency and user experience.
Embrace emerging technologies such as AI, machine learning, and blockchain
Focus on creating scalable and secure software systems
Prioritize user-centric design and seamless integration of features
Collaborate with cross-functional teams to drive innovation and continuous improvement
Q126. How to achieve testing through SoapUI
Testing through SoapUI involves creating test cases, executing them, and analyzing results using the SoapUI tool.
Create test cases in SoapUI by defining requests and assertions
Execute test cases to send requests to the API and receive responses
Analyze test results to identify any failures or issues
Use SoapUI features like data-driven testing, assertions, and reporting for comprehensive testing
Integrate SoapUI with CI/CD tools for automated testing
Q127. Difference between Power Query and Power view
Power Query is used for data transformation and Power View is used for data visualization in Power BI.
Power Query is used to extract, transform, and load data from different sources.
Power View is used to create interactive visualizations and reports based on the transformed data.
Power Query is more focused on data preparation and cleaning, while Power View is focused on data visualization.
Power Query can be used to merge, append, and transform data before visualizing it in Po...read more
Q128. Find the 4th highest salary from the SQL table
Use SQL query with ORDER BY and LIMIT to find the 4th highest salary
Use ORDER BY clause to sort salaries in descending order
Use LIMIT 3,1 to skip the first 3 highest salaries and get the 4th highest salary
Q129. Different waits used in selenium
Different waits used in Selenium
Implicit Wait
Explicit Wait
Fluent Wait
Thread.sleep()
WebDriverWait
Q130. POM framework in detail
POM is a design pattern used in Selenium for creating object repositories and organizing test code.
POM stands for Page Object Model
It separates the test code from the page objects
Each page is represented as a class and contains its own methods and locators
It improves code reusability and maintainability
It helps in reducing code duplication
It is widely used in Selenium automation testing
Q131. What are relationship cardinality
Relationship cardinality defines the number of instances of one entity that can be associated with the number of instances of another entity.
One-to-One: Each record in the first entity is associated with only one record in the second entity.
One-to-Many: Each record in the first entity can be associated with multiple records in the second entity.
Many-to-Many: Multiple records in the first entity can be associated with multiple records in the second entity.
Q132. what is service performance review
Service performance review is a process of evaluating the performance of IT services to ensure they meet agreed-upon targets and standards.
Service performance review involves analyzing key performance indicators (KPIs) such as availability, reliability, and response time.
It helps identify areas for improvement and optimization in IT services.
Regular service performance reviews can help prevent major incidents by addressing underlying issues proactively.
Examples of service per...read more
Q133. closure meaning how to implement
Closure in programming refers to the ability of a function to access variables from its parent scope even after the parent function has finished executing.
A closure is created when a function is defined within another function and the inner function references variables from the outer function.
Closures are commonly used in event handlers, callbacks, and asynchronous programming.
Example: const outerFunction = () => { const outerVar = 'I am outer'; return () => { console.log(ou...read more
Q134. Explain Spring Boot flow in your project
Spring Boot simplifies the development of Java applications by providing a set of tools and conventions.
Spring Boot eliminates the need for manual configuration by providing defaults and auto-configuration.
It includes embedded servers like Tomcat, Jetty, or Undertow for easy deployment.
Spring Boot starters help in quickly setting up dependencies and configurations.
Annotations like @SpringBootApplication and @RestController simplify the development process.
Q135. Do you know how to use Du in uipath
Yes, Du is a built-in activity in UiPath used for deleting a file or folder.
Du activity is used to delete a file or folder in UiPath.
It requires specifying the path of the file or folder to be deleted.
Make sure to handle exceptions when using Du activity.
Example: Du activity can be used to delete temporary files after processing data.
Q136. Oops in python and different concepts in oops
Object-oriented programming (OOP) in Python involves concepts like classes, objects, inheritance, polymorphism, and encapsulation.
Classes are blueprints for creating objects with attributes and methods.
Objects are instances of classes that can store data and perform actions.
Inheritance allows a class to inherit attributes and methods from another class.
Polymorphism enables objects to be treated as instances of their parent class.
Encapsulation restricts access to certain compo...read more
Q137. Email campaigns hie to handle them
Email campaigns should be handled strategically with personalized content and targeted audience segmentation.
Segment your audience based on demographics, behavior, or preferences to send personalized content.
Use A/B testing to optimize subject lines, content, and timing for better engagement.
Monitor key metrics such as open rates, click-through rates, and conversions to measure campaign success.
Automate email workflows to send relevant content at the right time based on user ...read more
Q138. What is @SpringBootApplication
Annotation used to mark a class as a Spring Boot application
Main annotation in Spring Boot to indicate the starting point of the application
Combines @Configuration, @EnableAutoConfiguration, and @ComponentScan annotations
Used to enable the auto-configuration feature in Spring Boot
Reduces the need for XML configuration in Spring applications
Q139. OOP concept in C#
OOP concept in C# involves creating classes, objects, inheritance, polymorphism, and encapsulation.
Classes are blueprints for objects, containing properties and methods.
Objects are instances of classes, representing real-world entities.
Inheritance allows a class to inherit properties and methods from another class.
Polymorphism enables objects to be treated as instances of their parent class.
Encapsulation restricts access to certain components of a class, promoting data hiding...read more
Q140. Which language comfortable
I am comfortable with multiple programming languages, including Java, Python, and C++.
Proficient in Java, Python, and C++
Experience with JavaScript, HTML, and CSS
Familiarity with SQL and NoSQL databases
Comfortable with object-oriented programming and design patterns
Q141. What is Salesforce
Salesforce is a cloud-based customer relationship management (CRM) platform that helps businesses manage their sales, marketing, and customer support.
Salesforce provides a range of tools and features for managing customer data, including lead and opportunity tracking, email marketing, and customer service management.
It allows businesses to automate their sales and marketing processes, and provides real-time analytics and reporting to help them make data-driven decisions.
Sales...read more
Q142. Design architecture for high volume applications
Designing architecture for high volume applications requires scalable infrastructure, efficient data storage, and optimized performance.
Utilize cloud services for scalability and flexibility
Implement caching mechanisms to reduce load on servers
Use distributed databases for efficient data storage and retrieval
Optimize code for performance and minimize latency
Consider microservices architecture for modular and scalable design
Q143. Business Benefits & Implementation Process
Business benefits and implementation process are crucial for successful project delivery.
Business benefits should be clearly defined and aligned with project goals.
Implementation process should be well-planned and executed with proper communication and collaboration.
Regular monitoring and evaluation of the implementation process is necessary to ensure success.
Examples of business benefits include increased revenue, improved customer satisfaction, and cost savings.
Examples of ...read more
Q144. Write Dax for total sales of a product
Use SUMX function in DAX to calculate total sales of a product
Use SUMX function to iterate over each row in the sales table
Filter the table to include only the specific product
Sum up the sales amount for each row to get the total sales
Q145. What is CPP,SQL, front end
CPP is a programming language, SQL is a database language, and front end refers to the user interface of a software application.
CPP is a high-level programming language used for developing applications and software.
SQL is a language used for managing and manipulating data in a relational database.
Front end refers to the user interface of a software application, including the design, layout, and functionality.
Examples of front end technologies include HTML, CSS, and JavaScript...read more
Q146. What is oops types explain
Object-oriented programming has four main types of concepts: encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: bundling of data and methods that manipulate the data within a single unit
Inheritance: creating new classes from existing ones
Polymorphism: ability of objects to take on many forms
Abstraction: hiding implementation details while showing only the necessary information
Q147. Why we need micro services
Microservices allow for modular and scalable software development.
Microservices break down large applications into smaller, independent services.
Each service can be developed, deployed, and scaled independently.
This allows for greater flexibility and agility in software development.
Microservices also promote better fault isolation and easier maintenance.
Examples of companies using microservices include Netflix, Amazon, and Uber.
Q148. Authentication in our project
Authentication in our project involves verifying the identity of users before granting access.
Implement secure login functionality using encryption algorithms like bcrypt
Utilize session management to track user authentication status
Consider implementing multi-factor authentication for added security
Q149. Types of Request in Apis
Types of requests in APIs include GET, POST, PUT, DELETE.
GET - Used to retrieve data from a server
POST - Used to send data to a server to create/update a resource
PUT - Used to update a resource on the server
DELETE - Used to delete a resource on the server
Q150. Upgradation experience
I have extensive experience in upgrading Oracle applications, including planning, testing, and executing upgrades.
Led multiple successful Oracle application upgrades from planning to execution
Performed thorough testing to ensure compatibility and functionality post-upgrade
Worked closely with stakeholders to minimize downtime and disruptions during upgrades
Q151. Process for brute force mitigation
Implementing a process to prevent brute force attacks on a system.
Implement account lockout policies after a certain number of failed login attempts
Use CAPTCHA or multi-factor authentication to verify user identity
Monitor login attempts and block IP addresses with suspicious activity
Regularly update passwords and educate users on strong password practices
Q152. Performance wise for the application
Performance of the application is crucial for user satisfaction and efficiency.
Optimize code for faster execution
Reduce unnecessary network calls
Implement caching mechanisms
Use efficient data structures and algorithms
Monitor and analyze performance metrics regularly
Q153. How to handle multiple window
Handle multiple windows by using window handles and switching between them.
Use getWindowHandles() method to get all window handles
Switch between windows using switchTo().window(handle)
Perform actions on the desired window
Q154. Who is discovered by python
Python is a programming language discovered by Guido van Rossum in 1989.
Python is a high-level, interpreted programming language.
It is used for web development, data analysis, artificial intelligence, and more.
Guido van Rossum started working on Python in the late 1980s and released the first version in 1991.
Python is named after the Monty Python comedy group.
Python is open-source and has a large community of developers contributing to its development.
Q155. What is hoisting in Javascript
Hoisting is a JavaScript mechanism where variable and function declarations are moved to the top of their containing scope.
Variable declarations are hoisted but not their initializations.
Function declarations are fully hoisted, meaning they can be called before they are declared.
Hoisting can lead to unexpected behavior if not understood properly.
Q156. New syntaxes in sap s4 hana
New syntaxes in SAP S4 HANA include CDS views, AMDP, and SQLScript enhancements.
Core Data Services (CDS) views allow for defining data models and database views in a single language.
ABAP Managed Database Procedures (AMDP) enable the execution of database procedures within ABAP code.
SQLScript enhancements provide improved performance and flexibility for database operations.
Q157. Key metrics in Problem Management
Key metrics in Problem Management include mean time to restore service, number of incidents prevented, and percentage of recurring incidents.
Mean time to restore service (MTTRS) measures the average time taken to resolve a problem and restore service.
Number of incidents prevented indicates the effectiveness of problem management in identifying and resolving underlying issues.
Percentage of recurring incidents shows the success in preventing repeated incidents by addressing roo...read more
Q158. What is Guidewire ?
Guidewire is a software company that provides core system software for property and casualty insurers.
Guidewire offers software solutions for policy administration, claims management, and billing.
Their products help insurance companies streamline processes, improve customer service, and increase efficiency.
Examples of Guidewire products include PolicyCenter, ClaimCenter, and BillingCenter.
Q159. Security mechanisms in an API
Security mechanisms in an API ensure data protection and prevent unauthorized access.
Use authentication methods like OAuth or API keys to verify user identity
Implement encryption to secure data transmission
Utilize rate limiting to prevent abuse and protect against DDoS attacks
Regularly update and patch software to address security vulnerabilities
Q160. Tell me about sdlc process
SDLC (Software Development Life Cycle) is a process used by software development teams to design, develop, and test high-quality software.
SDLC consists of several phases including planning, analysis, design, implementation, testing, and maintenance.
Each phase has its own set of activities and deliverables to ensure the successful completion of the project.
Examples of SDLC models include Waterfall, Agile, and DevOps.
SDLC helps in improving the quality of the software, reducing...read more
Q161. What is SSO ?
SSO stands for Single Sign-On, a method of access control that allows a user to log in with a single ID and password to access multiple applications.
SSO eliminates the need for users to remember multiple passwords for different applications.
It improves user experience by reducing the number of times a user has to log in.
SSO can be implemented using technologies like SAML, OAuth, or OpenID Connect.
Example: A user logs into their company's network and can access their email, pr...read more
Q162. What are swaps?
Swaps are financial agreements between two parties to exchange cash flows or assets in the future.
Swaps are commonly used in finance to manage risk or speculate on market movements.
There are different types of swaps such as interest rate swaps, currency swaps, and commodity swaps.
In an interest rate swap, two parties exchange interest rate payments on a notional amount of principal.
Currency swaps involve exchanging principal and interest payments in one currency for another.
C...read more
Q163. What are forwards?
Forwards are financial contracts where two parties agree to exchange an asset at a specified future date and price.
Forwards are customized contracts traded over-the-counter (OTC)
They are used to hedge against price fluctuations or speculate on future prices
Settlement occurs at the end of the contract period
Examples include currency forwards, commodity forwards, and interest rate forwards
Q164. what are closure
Closures are functions that have access to variables from their containing scope even after the scope has closed.
Closures allow functions to maintain access to variables from their parent function even after the parent function has finished executing.
Closures are commonly used in JavaScript to create private variables and functions.
Example: function outerFunction() { let outerVar = 'I am outer'; return function innerFunction() { console.log(outerVar); }; }
Q165. Roles as a scrum master
Scrum Master is responsible for facilitating the Scrum process and ensuring the team adheres to Scrum values, practices, and rules.
Facilitates Scrum events such as Sprint Planning, Daily Scrum, Sprint Review, and Sprint Retrospective
Removes impediments that prevent the team from achieving their goals
Coaches the team on Agile and Scrum principles
Helps the team to continuously improve their processes and practices
Acts as a servant leader to the team
Ensures the team follows Scru...read more
Q166. What is terraform?
Terraform is an open-source infrastructure as code software tool created by HashiCorp.
Terraform allows users to define and provision infrastructure using a declarative configuration language.
It supports multiple cloud providers such as AWS, Azure, and Google Cloud Platform.
Infrastructure is defined in Terraform configuration files, which describe the desired state of the infrastructure.
Terraform then creates an execution plan to reach the desired state and executes it to prov...read more
Q167. Components of Power BI
Power BI components include Power Query, Power Pivot, Power View, and Power Map.
Power Query: Used for data extraction, transformation, and loading (ETL)
Power Pivot: Used for data modeling and analysis
Power View: Used for data visualization and interactive reports
Power Map: Used for geospatial data visualization
Q168. What is java explain
Java is a high-level, object-oriented programming language used to develop applications for various platforms.
Java is platform-independent, meaning it can run on any platform with a Java Virtual Machine (JVM)
It is known for its security features and is commonly used for developing web and mobile applications
Java is also used for developing enterprise-level applications and software tools
Some popular Java frameworks include Spring, Hibernate, and Struts
Q169. html implementation in angular
HTML can be implemented in Angular using templates and data binding.
Use Angular's template syntax to include HTML in components
Utilize data binding to dynamically update HTML content
Example:
{{ variable }}
Q170. what is minus query.
A minus query is a type of SQL query that retrieves records from one table that do not have a corresponding record in another table.
Minus query is used to find records in one table that do not exist in another table.
It is similar to the 'EXCEPT' keyword in some SQL databases.
Example: SELECT * FROM table1 MINUS SELECT * FROM table2;
Q171. What is GCD in Swift
GCD (Grand Central Dispatch) is a concurrency framework in Swift that allows developers to perform tasks concurrently.
GCD provides a way to execute tasks concurrently without managing threads manually.
It uses queues to manage tasks and provides different types of queues like serial and concurrent queues.
GCD simplifies the process of writing concurrent code by abstracting away the complexities of thread management.
Example: DispatchQueue.main.async { // perform UI updates }
Q172. Design System Algorithms Code
Designing system algorithms involves creating efficient and effective code to solve specific problems.
Understand the problem and requirements before designing algorithms
Choose appropriate data structures and algorithms for the task
Consider time and space complexity when designing algorithms
Test and optimize the code for performance
Examples: sorting algorithms like quicksort or searching algorithms like binary search
Q173. How to launch VPC
To launch a VPC, you can use the AWS Management Console, AWS CLI, or AWS SDKs.
Use AWS Management Console to navigate to VPC dashboard and click on 'Create VPC'
Specify the VPC details like CIDR block, tenancy, and enable DNS hostnames
Add subnets, route tables, internet gateways, and security groups as needed
Use AWS CLI command 'create-vpc' to launch VPC programmatically
Use AWS SDKs like Boto3 for Python to automate VPC creation
Q174. Quality role and it's ....
Quality role and its importance in ensuring products meet standards and customer expectations.
Quality role involves monitoring and evaluating processes to ensure products meet standards.
Quality analysts conduct tests, identify defects, and suggest improvements.
They work closely with production teams to implement quality control measures.
Quality role is crucial in maintaining customer satisfaction and brand reputation.
Examples: conducting product inspections, analyzing data fo...read more
Q175. Lifecycle hooks in Vue.js
Lifecycle hooks in Vue.js are special methods provided by Vue that allow you to perform actions at specific stages of a component's lifecycle.
Created: Called after the instance has been initialized, before data observation and event/watcher setup.
Mounted: Called after the instance has been mounted (i.e., added to the DOM).
Updated: Called after a data change causes the virtual DOM to re-render and patch the real DOM.
Destroyed: Called when a component is destroyed, useful for c...read more
Q176. reverse array program
Reverse an array of strings
Create a new array to store the reversed strings
Iterate through the original array in reverse order and add each element to the new array
Return the new array with reversed strings
Q177. Truncate vs Delete
Truncate removes all data from a table quickly, while delete removes specific rows one by one.
Truncate is faster than delete as it does not log individual row deletions.
Truncate resets identity columns, while delete does not.
Truncate cannot be rolled back, while delete can be.
Truncate is a DDL operation, while delete is a DML operation.
Q178. explain cucumber
Cucumber is a tool used for behavior-driven development (BDD) to write acceptance tests in a human-readable format.
Cucumber allows for collaboration between non-technical and technical team members by writing test cases in plain English
Test cases are written in feature files using Gherkin syntax
Cucumber executes the test cases by mapping them to step definitions written in programming languages like Java or Ruby
Q179. linked list problem
A linked list problem involves manipulating a data structure where each element points to the next one.
Understand the basic concept of linked lists and how nodes are connected.
Practice common operations like insertion, deletion, and traversal.
Consider edge cases like handling empty lists or loops in the linked list.
Top HR Questions asked in Look My Cook
Interview Process at Look My Cook
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month