Add office photos
Engaged Employer

Zensar Technologies

3.7
based on 2.4k Reviews
Filter interviews by

100+ Look My Cook Interview Questions and Answers

Updated 23 Nov 2024
Popular Designations

Q101. Difference in String and String Buffer OOPs concept Exceptional Handling

Ans.

String is immutable, String Buffer is mutable. OOPs concept focuses on objects and classes. Exception handling is used to handle runtime errors.

  • String is immutable, meaning its value cannot be changed once it is created. String Buffer is mutable, allowing for modifications to the value.

  • OOPs concept revolves around the idea of objects and classes, where objects are instances of classes and encapsulate data and behavior.

  • Exception handling is used to handle runtime errors and pr...read more

Add your answer

Q102. Risky user identification and process to mitigate it.

Ans.

Risky user identification involves analyzing user behavior and implementing measures to reduce potential risks.

  • Utilize user behavior analytics to identify unusual patterns or activities

  • Implement multi-factor authentication for sensitive actions

  • Regularly review user access permissions and revoke unnecessary privileges

  • Train employees on cybersecurity best practices to prevent risky behavior

  • Monitor user activity in real-time to quickly detect and respond to potential threats

Add your answer

Q103. Difference between having and where clause

Ans.

Having clause is used with aggregate functions while where clause is used to filter rows

  • Having clause is used with GROUP BY to filter groups based on conditions

  • Where clause is used to filter rows based on conditions

  • Having clause is applied after grouping while where clause is applied before grouping

  • Example: SELECT department, AVG(salary) FROM employees GROUP BY department HAVING AVG(salary) > 50000

  • Example: SELECT * FROM employees WHERE department = 'IT'

Add your answer

Q104. What is the purpose of Guidewire in Insurance

Ans.

Guidewire is a software platform used in the insurance industry to manage policies, claims, and billing processes.

  • Guidewire helps insurance companies streamline their operations and improve efficiency.

  • It provides tools for policy administration, claims management, billing, and underwriting.

  • Guidewire allows insurers to offer better customer service by automating processes and providing real-time data.

  • It helps insurers adapt to changing market conditions and regulations by prov...read more

Add your answer
Discover Look My Cook interview dos and don'ts from real experiences

Q105. Program to reverse a string.

Ans.

Program to reverse a string.

  • Create an empty string to store the reversed string

  • Loop through the original string from end to start

  • Add each character to the new string

  • Return the new string

Add your answer

Q106. Backbase architecture as position for backbase developer

Ans.

Backbase architecture is the foundation for developing applications using the Backbase platform.

  • Backbase architecture includes modules like Experience Manager, Portal Manager, and Forms.

  • Developers need to understand how these modules interact and communicate with each other.

  • Knowledge of RESTful APIs, microservices, and front-end technologies like AngularJS is essential for Backbase development.

Add your answer
Are these interview questions helpful?

Q107. SQL joins and types plus code situation examples

Ans.

Understanding SQL joins and types with code examples

  • Types of SQL joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN

  • INNER JOIN returns rows when there is at least one match in both tables

  • LEFT JOIN returns all rows from the left table and the matched rows from the right table

  • RIGHT JOIN returns all rows from the right table and the matched rows from the left table

  • FULL JOIN returns rows when there is a match in one of the tables

  • Example: SELECT * FROM table1 INNER JOIN...read more

Add your answer

Q108. Who is father of C programming

Ans.

Dennis Ritchie is considered the father of C programming.

  • Dennis Ritchie developed the C programming language at Bell Labs in the early 1970s.

  • C programming language became widely used and influenced many other programming languages.

  • Ritchie also co-authored the book 'The C Programming Language' with Brian Kernighan.

  • C programming language is known for its efficiency, flexibility, and low-level control.

View 1 answer
Share interview questions and help millions of jobseekers 🌟

Q109. Design for bruteforce method to address ondemand requirement

Ans.

Bruteforce method for ondemand requirement design

  • Identify the problem and define the scope

  • Determine the possible inputs and outputs

  • Create a brute force algorithm to solve the problem

  • Optimize the algorithm to reduce time complexity

  • Test the algorithm with various inputs and edge cases

Add your answer

Q110. what is backup? Explain different types of normalization?

Ans.

Backup is the process of creating a copy of data to protect against data loss.

  • Different types of backups include full, differential, and incremental backups.

  • Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.

  • There are different levels of normalization, including first normal form (1NF), second normal form (2NF), and third normal form (3NF).

  • Normalization helps to prevent data inconsistencies and anomalies.

  • Example: A cu...read more

Add your answer

Q111. OOPS concepts with writing code for them

Ans.

OOPS concepts are fundamental to software development. They include inheritance, encapsulation, abstraction, and polymorphism.

  • Inheritance allows a class to inherit properties and methods from another class.

  • Encapsulation is the practice of hiding data and methods within a class, so they cannot be accessed from outside the class.

  • Abstraction is the process of simplifying complex systems by breaking them down into smaller, more manageable parts.

  • Polymorphism allows objects to take...read more

Add your answer

Q112. Adop phases during oracle apps patching?

Ans.

ADOP (Application DBA Online Patching) has multiple phases during Oracle Apps patching.

  • Prepare phase - prepares the system for patching

  • Apply phase - applies the patches to the system

  • Finalize phase - finalizes the patching process

  • Cutover phase - switches the system to the new patch level

  • Cleanup phase - cleans up temporary files and logs

Add your answer

Q113. What are common data connectivity modes?

Ans.

Common data connectivity modes include DirectQuery, Import, Live Connection, and Composite models.

  • DirectQuery allows querying data directly from the data source in real-time.

  • Import mode imports data into Power BI for faster performance but may not reflect real-time data.

  • Live Connection connects Power BI to a data source without importing data.

  • Composite models combine DirectQuery and Import modes for flexibility.

Add your answer

Q114. Language that you prefer

Ans.

I prefer working with Java as it is a versatile language with a strong community and vast libraries.

  • Java is platform-independent and can be used for web development, mobile app development, and enterprise applications.

  • Java has a vast collection of libraries and frameworks like Spring, Hibernate, and Struts.

  • Java has a strong community and support system, making it easy to find solutions to problems.

  • Java is a statically typed language, which helps catch errors at compile-time.

  • J...read more

Add your answer

Q115. How to use zipkin in microservices

Ans.

Zipkin is a distributed tracing system used to monitor microservices communication.

  • Add Zipkin dependencies to each microservice

  • Configure each microservice to send tracing data to Zipkin server

  • Use Zipkin UI to visualize and analyze the tracing data

  • Add trace IDs to logs for better debugging

  • Use Zipkin to identify performance bottlenecks and optimize microservices communication

Add your answer

Q116. Writing Rest API for the real time example

Ans.

Writing a REST API for a real-time example

  • Choose a real-time example, such as a chat application or a stock market tracker

  • Design the API endpoints and their corresponding HTTP methods

  • Implement the API using a framework like Express.js or Django

  • Use WebSockets or long-polling for real-time updates

  • Ensure authentication and authorization mechanisms are in place

  • Handle error cases and provide appropriate error responses

View 1 answer

Q117. Explain Spring Security flow in your project

Ans.

Spring Security is used for authentication and authorization in Java projects.

  • Spring Security provides authentication and authorization support out of the box.

  • It can be configured using XML or Java configuration.

  • It supports various authentication mechanisms like form-based, basic, and OAuth.

  • Roles and permissions can be defined using annotations or configuration.

  • Example: @EnableWebSecurity annotation enables Spring Security in a project.

Add your answer

Q118. what is destructor

Ans.

Destructor is a special member function in C++ that is called automatically when an object is destroyed.

  • Destructors have the same name as the class preceded by a tilde (~).

  • They are used to release resources allocated by the object during its lifetime.

  • Example: ~ClassName() { // destructor code }

Add your answer

Q119. Why .net core and Microservices

Ans.

Using .NET Core and Microservices allows for scalable, modular, and efficient development of applications.

  • Increased scalability by breaking down applications into smaller, independent services

  • Modular architecture allows for easier maintenance and updates

  • Efficient resource utilization by only deploying necessary services

  • Support for cross-platform development with .NET Core

Add your answer

Q120. Siem content development and use cases example

Ans.

Siem content development involves creating rules and use cases to detect and respond to security threats.

  • Developing custom rules to monitor for specific security events

  • Creating use cases to identify patterns of suspicious activity

  • Leveraging threat intelligence feeds to enhance detection capabilities

Add your answer

Q121. Step to safeguard if account got compromised.

Ans.

Enable two-factor authentication, change passwords, monitor account activity.

  • Enable two-factor authentication for added security.

  • Change passwords regularly to prevent unauthorized access.

  • Monitor account activity for any suspicious behavior.

  • Notify the account provider immediately if account is compromised.

Add your answer

Q122. What is RLS and explain in detail

Ans.

RLS stands for Row-Level Security, a feature in Power BI that restricts data access based on user roles.

  • RLS allows you to control which rows of data a user can access in a Power BI report or dashboard

  • You can define security roles and rules to filter data based on user attributes or roles

  • RLS helps in ensuring data privacy and compliance with regulations

  • For example, you can use RLS to restrict a sales manager to only see data related to their region

Add your answer

Q123. Technologies, frameworks and tools for planning RAID and RACI Matrix.

Ans.

Technologies, frameworks, and tools for planning RAID and RACI Matrix

  • RAID Matrix: Risk Assessment and Identification Matrix used for project risk management

  • RACI Matrix: Responsible, Accountable, Consulted, and Informed Matrix used for defining roles and responsibilities in a project

  • Tools: Microsoft Excel, Google Sheets, Smartsheet, Trello, Asana

  • Frameworks: Agile, Scrum, Waterfall

Add your answer

Q124. Explain about exception

Ans.

An exception is an event that disrupts the normal flow of a program's execution.

  • Exceptions are used to handle errors and other exceptional events in a program.

  • They can be caught and handled using try-catch blocks.

  • Common types of exceptions include NullPointerException, ArrayIndexOutOfBoundsException, and IOException.

Add your answer

Q125. What is your technology vision

Ans.

My technology vision is to leverage cutting-edge tools and techniques to create innovative solutions that improve efficiency and user experience.

  • Embrace emerging technologies such as AI, machine learning, and blockchain

  • Focus on creating scalable and secure software systems

  • Prioritize user-centric design and seamless integration of features

  • Collaborate with cross-functional teams to drive innovation and continuous improvement

Add your answer

Q126. How to achieve testing through SoapUI

Ans.

Testing through SoapUI involves creating test cases, executing them, and analyzing results using the SoapUI tool.

  • Create test cases in SoapUI by defining requests and assertions

  • Execute test cases to send requests to the API and receive responses

  • Analyze test results to identify any failures or issues

  • Use SoapUI features like data-driven testing, assertions, and reporting for comprehensive testing

  • Integrate SoapUI with CI/CD tools for automated testing

Add your answer

Q127. Difference between Power Query and Power view

Ans.

Power Query is used for data transformation and Power View is used for data visualization in Power BI.

  • Power Query is used to extract, transform, and load data from different sources.

  • Power View is used to create interactive visualizations and reports based on the transformed data.

  • Power Query is more focused on data preparation and cleaning, while Power View is focused on data visualization.

  • Power Query can be used to merge, append, and transform data before visualizing it in Po...read more

Add your answer

Q128. Find the 4th highest salary from the SQL table

Ans.

Use SQL query with ORDER BY and LIMIT to find the 4th highest salary

  • Use ORDER BY clause to sort salaries in descending order

  • Use LIMIT 3,1 to skip the first 3 highest salaries and get the 4th highest salary

Add your answer

Q129. Different waits used in selenium

Ans.

Different waits used in Selenium

  • Implicit Wait

  • Explicit Wait

  • Fluent Wait

  • Thread.sleep()

  • WebDriverWait

Add your answer

Q130. POM framework in detail

Ans.

POM is a design pattern used in Selenium for creating object repositories and organizing test code.

  • POM stands for Page Object Model

  • It separates the test code from the page objects

  • Each page is represented as a class and contains its own methods and locators

  • It improves code reusability and maintainability

  • It helps in reducing code duplication

  • It is widely used in Selenium automation testing

View 1 answer

Q131. What are relationship cardinality

Ans.

Relationship cardinality defines the number of instances of one entity that can be associated with the number of instances of another entity.

  • One-to-One: Each record in the first entity is associated with only one record in the second entity.

  • One-to-Many: Each record in the first entity can be associated with multiple records in the second entity.

  • Many-to-Many: Multiple records in the first entity can be associated with multiple records in the second entity.

Add your answer

Q132. what is service performance review

Ans.

Service performance review is a process of evaluating the performance of IT services to ensure they meet agreed-upon targets and standards.

  • Service performance review involves analyzing key performance indicators (KPIs) such as availability, reliability, and response time.

  • It helps identify areas for improvement and optimization in IT services.

  • Regular service performance reviews can help prevent major incidents by addressing underlying issues proactively.

  • Examples of service per...read more

Add your answer

Q133. closure meaning how to implement

Ans.

Closure in programming refers to the ability of a function to access variables from its parent scope even after the parent function has finished executing.

  • A closure is created when a function is defined within another function and the inner function references variables from the outer function.

  • Closures are commonly used in event handlers, callbacks, and asynchronous programming.

  • Example: const outerFunction = () => { const outerVar = 'I am outer'; return () => { console.log(ou...read more

Add your answer

Q134. Explain Spring Boot flow in your project

Ans.

Spring Boot simplifies the development of Java applications by providing a set of tools and conventions.

  • Spring Boot eliminates the need for manual configuration by providing defaults and auto-configuration.

  • It includes embedded servers like Tomcat, Jetty, or Undertow for easy deployment.

  • Spring Boot starters help in quickly setting up dependencies and configurations.

  • Annotations like @SpringBootApplication and @RestController simplify the development process.

Add your answer

Q135. Do you know how to use Du in uipath

Ans.

Yes, Du is a built-in activity in UiPath used for deleting a file or folder.

  • Du activity is used to delete a file or folder in UiPath.

  • It requires specifying the path of the file or folder to be deleted.

  • Make sure to handle exceptions when using Du activity.

  • Example: Du activity can be used to delete temporary files after processing data.

Add your answer

Q136. Oops in python and different concepts in oops

Ans.

Object-oriented programming (OOP) in Python involves concepts like classes, objects, inheritance, polymorphism, and encapsulation.

  • Classes are blueprints for creating objects with attributes and methods.

  • Objects are instances of classes that can store data and perform actions.

  • Inheritance allows a class to inherit attributes and methods from another class.

  • Polymorphism enables objects to be treated as instances of their parent class.

  • Encapsulation restricts access to certain compo...read more

Add your answer

Q137. Email campaigns hie to handle them

Ans.

Email campaigns should be handled strategically with personalized content and targeted audience segmentation.

  • Segment your audience based on demographics, behavior, or preferences to send personalized content.

  • Use A/B testing to optimize subject lines, content, and timing for better engagement.

  • Monitor key metrics such as open rates, click-through rates, and conversions to measure campaign success.

  • Automate email workflows to send relevant content at the right time based on user ...read more

Add your answer

Q138. What is @SpringBootApplication

Ans.

Annotation used to mark a class as a Spring Boot application

  • Main annotation in Spring Boot to indicate the starting point of the application

  • Combines @Configuration, @EnableAutoConfiguration, and @ComponentScan annotations

  • Used to enable the auto-configuration feature in Spring Boot

  • Reduces the need for XML configuration in Spring applications

Add your answer

Q139. OOP concept in C#

Ans.

OOP concept in C# involves creating classes, objects, inheritance, polymorphism, and encapsulation.

  • Classes are blueprints for objects, containing properties and methods.

  • Objects are instances of classes, representing real-world entities.

  • Inheritance allows a class to inherit properties and methods from another class.

  • Polymorphism enables objects to be treated as instances of their parent class.

  • Encapsulation restricts access to certain components of a class, promoting data hiding...read more

Add your answer

Q140. Which language comfortable

Ans.

I am comfortable with multiple programming languages, including Java, Python, and C++.

  • Proficient in Java, Python, and C++

  • Experience with JavaScript, HTML, and CSS

  • Familiarity with SQL and NoSQL databases

  • Comfortable with object-oriented programming and design patterns

Add your answer

Q141. What is Salesforce

Ans.

Salesforce is a cloud-based customer relationship management (CRM) platform that helps businesses manage their sales, marketing, and customer support.

  • Salesforce provides a range of tools and features for managing customer data, including lead and opportunity tracking, email marketing, and customer service management.

  • It allows businesses to automate their sales and marketing processes, and provides real-time analytics and reporting to help them make data-driven decisions.

  • Sales...read more

Add your answer

Q142. Design architecture for high volume applications

Ans.

Designing architecture for high volume applications requires scalable infrastructure, efficient data storage, and optimized performance.

  • Utilize cloud services for scalability and flexibility

  • Implement caching mechanisms to reduce load on servers

  • Use distributed databases for efficient data storage and retrieval

  • Optimize code for performance and minimize latency

  • Consider microservices architecture for modular and scalable design

Add your answer

Q143. Business Benefits & Implementation Process

Ans.

Business benefits and implementation process are crucial for successful project delivery.

  • Business benefits should be clearly defined and aligned with project goals.

  • Implementation process should be well-planned and executed with proper communication and collaboration.

  • Regular monitoring and evaluation of the implementation process is necessary to ensure success.

  • Examples of business benefits include increased revenue, improved customer satisfaction, and cost savings.

  • Examples of ...read more

Add your answer

Q144. Write Dax for total sales of a product

Ans.

Use SUMX function in DAX to calculate total sales of a product

  • Use SUMX function to iterate over each row in the sales table

  • Filter the table to include only the specific product

  • Sum up the sales amount for each row to get the total sales

Add your answer

Q145. What is CPP,SQL, front end

Ans.

CPP is a programming language, SQL is a database language, and front end refers to the user interface of a software application.

  • CPP is a high-level programming language used for developing applications and software.

  • SQL is a language used for managing and manipulating data in a relational database.

  • Front end refers to the user interface of a software application, including the design, layout, and functionality.

  • Examples of front end technologies include HTML, CSS, and JavaScript...read more

Add your answer

Q146. What is oops types explain

Ans.

Object-oriented programming has four main types of concepts: encapsulation, inheritance, polymorphism, and abstraction.

  • Encapsulation: bundling of data and methods that manipulate the data within a single unit

  • Inheritance: creating new classes from existing ones

  • Polymorphism: ability of objects to take on many forms

  • Abstraction: hiding implementation details while showing only the necessary information

Add your answer

Q147. Why we need micro services

Ans.

Microservices allow for modular and scalable software development.

  • Microservices break down large applications into smaller, independent services.

  • Each service can be developed, deployed, and scaled independently.

  • This allows for greater flexibility and agility in software development.

  • Microservices also promote better fault isolation and easier maintenance.

  • Examples of companies using microservices include Netflix, Amazon, and Uber.

Add your answer

Q148. Authentication in our project

Ans.

Authentication in our project involves verifying the identity of users before granting access.

  • Implement secure login functionality using encryption algorithms like bcrypt

  • Utilize session management to track user authentication status

  • Consider implementing multi-factor authentication for added security

Add your answer

Q149. Types of Request in Apis

Ans.

Types of requests in APIs include GET, POST, PUT, DELETE.

  • GET - Used to retrieve data from a server

  • POST - Used to send data to a server to create/update a resource

  • PUT - Used to update a resource on the server

  • DELETE - Used to delete a resource on the server

Add your answer

Q150. Upgradation experience

Ans.

I have extensive experience in upgrading Oracle applications, including planning, testing, and executing upgrades.

  • Led multiple successful Oracle application upgrades from planning to execution

  • Performed thorough testing to ensure compatibility and functionality post-upgrade

  • Worked closely with stakeholders to minimize downtime and disruptions during upgrades

Add your answer

Q151. Process for brute force mitigation

Ans.

Implementing a process to prevent brute force attacks on a system.

  • Implement account lockout policies after a certain number of failed login attempts

  • Use CAPTCHA or multi-factor authentication to verify user identity

  • Monitor login attempts and block IP addresses with suspicious activity

  • Regularly update passwords and educate users on strong password practices

Add your answer

Q152. Performance wise for the application

Ans.

Performance of the application is crucial for user satisfaction and efficiency.

  • Optimize code for faster execution

  • Reduce unnecessary network calls

  • Implement caching mechanisms

  • Use efficient data structures and algorithms

  • Monitor and analyze performance metrics regularly

Add your answer

Q153. How to handle multiple window

Ans.

Handle multiple windows by using window handles and switching between them.

  • Use getWindowHandles() method to get all window handles

  • Switch between windows using switchTo().window(handle)

  • Perform actions on the desired window

Add your answer

Q154. Who is discovered by python

Ans.

Python is a programming language discovered by Guido van Rossum in 1989.

  • Python is a high-level, interpreted programming language.

  • It is used for web development, data analysis, artificial intelligence, and more.

  • Guido van Rossum started working on Python in the late 1980s and released the first version in 1991.

  • Python is named after the Monty Python comedy group.

  • Python is open-source and has a large community of developers contributing to its development.

Add your answer

Q155. What is hoisting in Javascript

Ans.

Hoisting is a JavaScript mechanism where variable and function declarations are moved to the top of their containing scope.

  • Variable declarations are hoisted but not their initializations.

  • Function declarations are fully hoisted, meaning they can be called before they are declared.

  • Hoisting can lead to unexpected behavior if not understood properly.

Add your answer

Q156. New syntaxes in sap s4 hana

Ans.

New syntaxes in SAP S4 HANA include CDS views, AMDP, and SQLScript enhancements.

  • Core Data Services (CDS) views allow for defining data models and database views in a single language.

  • ABAP Managed Database Procedures (AMDP) enable the execution of database procedures within ABAP code.

  • SQLScript enhancements provide improved performance and flexibility for database operations.

Add your answer

Q157. Key metrics in Problem Management

Ans.

Key metrics in Problem Management include mean time to restore service, number of incidents prevented, and percentage of recurring incidents.

  • Mean time to restore service (MTTRS) measures the average time taken to resolve a problem and restore service.

  • Number of incidents prevented indicates the effectiveness of problem management in identifying and resolving underlying issues.

  • Percentage of recurring incidents shows the success in preventing repeated incidents by addressing roo...read more

Add your answer

Q158. What is Guidewire ?

Ans.

Guidewire is a software company that provides core system software for property and casualty insurers.

  • Guidewire offers software solutions for policy administration, claims management, and billing.

  • Their products help insurance companies streamline processes, improve customer service, and increase efficiency.

  • Examples of Guidewire products include PolicyCenter, ClaimCenter, and BillingCenter.

Add your answer

Q159. Security mechanisms in an API

Ans.

Security mechanisms in an API ensure data protection and prevent unauthorized access.

  • Use authentication methods like OAuth or API keys to verify user identity

  • Implement encryption to secure data transmission

  • Utilize rate limiting to prevent abuse and protect against DDoS attacks

  • Regularly update and patch software to address security vulnerabilities

Add your answer

Q160. Tell me about sdlc process

Ans.

SDLC (Software Development Life Cycle) is a process used by software development teams to design, develop, and test high-quality software.

  • SDLC consists of several phases including planning, analysis, design, implementation, testing, and maintenance.

  • Each phase has its own set of activities and deliverables to ensure the successful completion of the project.

  • Examples of SDLC models include Waterfall, Agile, and DevOps.

  • SDLC helps in improving the quality of the software, reducing...read more

Add your answer

Q161. What is SSO ?

Ans.

SSO stands for Single Sign-On, a method of access control that allows a user to log in with a single ID and password to access multiple applications.

  • SSO eliminates the need for users to remember multiple passwords for different applications.

  • It improves user experience by reducing the number of times a user has to log in.

  • SSO can be implemented using technologies like SAML, OAuth, or OpenID Connect.

  • Example: A user logs into their company's network and can access their email, pr...read more

Add your answer

Q162. What are swaps?

Ans.

Swaps are financial agreements between two parties to exchange cash flows or assets in the future.

  • Swaps are commonly used in finance to manage risk or speculate on market movements.

  • There are different types of swaps such as interest rate swaps, currency swaps, and commodity swaps.

  • In an interest rate swap, two parties exchange interest rate payments on a notional amount of principal.

  • Currency swaps involve exchanging principal and interest payments in one currency for another.

  • C...read more

Add your answer

Q163. What are forwards?

Ans.

Forwards are financial contracts where two parties agree to exchange an asset at a specified future date and price.

  • Forwards are customized contracts traded over-the-counter (OTC)

  • They are used to hedge against price fluctuations or speculate on future prices

  • Settlement occurs at the end of the contract period

  • Examples include currency forwards, commodity forwards, and interest rate forwards

Add your answer

Q164. what are closure

Ans.

Closures are functions that have access to variables from their containing scope even after the scope has closed.

  • Closures allow functions to maintain access to variables from their parent function even after the parent function has finished executing.

  • Closures are commonly used in JavaScript to create private variables and functions.

  • Example: function outerFunction() { let outerVar = 'I am outer'; return function innerFunction() { console.log(outerVar); }; }

Add your answer

Q165. Roles as a scrum master

Ans.

Scrum Master is responsible for facilitating the Scrum process and ensuring the team adheres to Scrum values, practices, and rules.

  • Facilitates Scrum events such as Sprint Planning, Daily Scrum, Sprint Review, and Sprint Retrospective

  • Removes impediments that prevent the team from achieving their goals

  • Coaches the team on Agile and Scrum principles

  • Helps the team to continuously improve their processes and practices

  • Acts as a servant leader to the team

  • Ensures the team follows Scru...read more

Add your answer

Q166. What is terraform?

Ans.

Terraform is an open-source infrastructure as code software tool created by HashiCorp.

  • Terraform allows users to define and provision infrastructure using a declarative configuration language.

  • It supports multiple cloud providers such as AWS, Azure, and Google Cloud Platform.

  • Infrastructure is defined in Terraform configuration files, which describe the desired state of the infrastructure.

  • Terraform then creates an execution plan to reach the desired state and executes it to prov...read more

Add your answer

Q167. Components of Power BI

Ans.

Power BI components include Power Query, Power Pivot, Power View, and Power Map.

  • Power Query: Used for data extraction, transformation, and loading (ETL)

  • Power Pivot: Used for data modeling and analysis

  • Power View: Used for data visualization and interactive reports

  • Power Map: Used for geospatial data visualization

Add your answer

Q168. What is java explain

Ans.

Java is a high-level, object-oriented programming language used to develop applications for various platforms.

  • Java is platform-independent, meaning it can run on any platform with a Java Virtual Machine (JVM)

  • It is known for its security features and is commonly used for developing web and mobile applications

  • Java is also used for developing enterprise-level applications and software tools

  • Some popular Java frameworks include Spring, Hibernate, and Struts

Add your answer

Q169. html implementation in angular

Ans.

HTML can be implemented in Angular using templates and data binding.

  • Use Angular's template syntax to include HTML in components

  • Utilize data binding to dynamically update HTML content

  • Example:

    {{ variable }}

Add your answer

Q170. what is minus query.

Ans.

A minus query is a type of SQL query that retrieves records from one table that do not have a corresponding record in another table.

  • Minus query is used to find records in one table that do not exist in another table.

  • It is similar to the 'EXCEPT' keyword in some SQL databases.

  • Example: SELECT * FROM table1 MINUS SELECT * FROM table2;

Add your answer

Q171. What is GCD in Swift

Ans.

GCD (Grand Central Dispatch) is a concurrency framework in Swift that allows developers to perform tasks concurrently.

  • GCD provides a way to execute tasks concurrently without managing threads manually.

  • It uses queues to manage tasks and provides different types of queues like serial and concurrent queues.

  • GCD simplifies the process of writing concurrent code by abstracting away the complexities of thread management.

  • Example: DispatchQueue.main.async { // perform UI updates }

Add your answer

Q172. Design System Algorithms Code

Ans.

Designing system algorithms involves creating efficient and effective code to solve specific problems.

  • Understand the problem and requirements before designing algorithms

  • Choose appropriate data structures and algorithms for the task

  • Consider time and space complexity when designing algorithms

  • Test and optimize the code for performance

  • Examples: sorting algorithms like quicksort or searching algorithms like binary search

Add your answer

Q173. How to launch VPC

Ans.

To launch a VPC, you can use the AWS Management Console, AWS CLI, or AWS SDKs.

  • Use AWS Management Console to navigate to VPC dashboard and click on 'Create VPC'

  • Specify the VPC details like CIDR block, tenancy, and enable DNS hostnames

  • Add subnets, route tables, internet gateways, and security groups as needed

  • Use AWS CLI command 'create-vpc' to launch VPC programmatically

  • Use AWS SDKs like Boto3 for Python to automate VPC creation

Add your answer

Q174. Quality role and it's ....

Ans.

Quality role and its importance in ensuring products meet standards and customer expectations.

  • Quality role involves monitoring and evaluating processes to ensure products meet standards.

  • Quality analysts conduct tests, identify defects, and suggest improvements.

  • They work closely with production teams to implement quality control measures.

  • Quality role is crucial in maintaining customer satisfaction and brand reputation.

  • Examples: conducting product inspections, analyzing data fo...read more

Add your answer

Q175. Lifecycle hooks in Vue.js

Ans.

Lifecycle hooks in Vue.js are special methods provided by Vue that allow you to perform actions at specific stages of a component's lifecycle.

  • Created: Called after the instance has been initialized, before data observation and event/watcher setup.

  • Mounted: Called after the instance has been mounted (i.e., added to the DOM).

  • Updated: Called after a data change causes the virtual DOM to re-render and patch the real DOM.

  • Destroyed: Called when a component is destroyed, useful for c...read more

Add your answer

Q176. reverse array program

Ans.

Reverse an array of strings

  • Create a new array to store the reversed strings

  • Iterate through the original array in reverse order and add each element to the new array

  • Return the new array with reversed strings

Add your answer

Q177. Truncate vs Delete

Ans.

Truncate removes all data from a table quickly, while delete removes specific rows one by one.

  • Truncate is faster than delete as it does not log individual row deletions.

  • Truncate resets identity columns, while delete does not.

  • Truncate cannot be rolled back, while delete can be.

  • Truncate is a DDL operation, while delete is a DML operation.

Add your answer

Q178. explain cucumber

Ans.

Cucumber is a tool used for behavior-driven development (BDD) to write acceptance tests in a human-readable format.

  • Cucumber allows for collaboration between non-technical and technical team members by writing test cases in plain English

  • Test cases are written in feature files using Gherkin syntax

  • Cucumber executes the test cases by mapping them to step definitions written in programming languages like Java or Ruby

Add your answer

Q179. linked list problem

Ans.

A linked list problem involves manipulating a data structure where each element points to the next one.

  • Understand the basic concept of linked lists and how nodes are connected.

  • Practice common operations like insertion, deletion, and traversal.

  • Consider edge cases like handling empty lists or loops in the linked list.

Add your answer
1
2
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Look My Cook

based on 104 interviews in the last 1 year
Interview experience
3.8
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.1
 • 528 Interview Questions
3.5
 • 423 Interview Questions
3.4
 • 303 Interview Questions
4.1
 • 203 Interview Questions
4.0
 • 200 Interview Questions
View all
Top Zensar Technologies Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter