Associate/Senior Associate -(Technical)
50+ Associate/Senior Associate -(Technical) Interview Questions and Answers
Q1. What are the different types of Database management systems. What are the Database languages ? What is the difference between drop, delete and truncate?
Different types of DBMS, DB languages & difference between drop, delete & truncate.
Types of DBMS: Relational, NoSQL, Object-oriented, Hierarchical, Network, etc.
Database languages: SQL, PL/SQL, T-SQL, etc.
DROP: Deletes a table and its data, cannot be rolled back.
DELETE: Deletes rows from a table, can be rolled back.
TRUNCATE: Deletes all rows from a table, cannot be rolled back.
Q2. 1.Difference between role and profile, 2. For what level of owd the share object will be available fo an object in apex sharing. 3.How to check fls in apex class.4. With sharing also consider fls in apex class?...
read moreTechnical interview questions on Apex, Aura and Webservices
Role defines the responsibilities and expectations of a position, while profile defines the access and permissions of a user
Share object is available for the same OWD level or higher
FLS can be checked using the Schema.DescribeFieldResult class in Apex
FLS is considered even with sharing in Apex class
Webservices callout can be done using the fetch() method in LWC or using the HttpRequest class in Apex
Application events ...read more
Associate/Senior Associate -(Technical) Interview Questions and Answers for Freshers
Q3. Tell me all chemicals name with their use and proper dilution
It is not possible to list all chemicals with their use and proper dilution in a single answer.
Chemicals have various uses and dilutions depending on the industry and application.
Some common chemicals and their uses include bleach for disinfecting, ammonia for cleaning, and hydrogen peroxide for wound care.
Proper dilution depends on the specific chemical and its intended use, and should be followed according to the manufacturer's instructions.
It is important to handle chemica...read more
Q4. Give a real time example of Inheritance, Polymorphism, Abstraction and Encapsulation.
Real-time examples of OOP concepts
Inheritance: A car is a vehicle, inheriting properties of a vehicle
Polymorphism: A shape can be a square or a circle, both implementing the same area method
Abstraction: A TV remote has buttons to perform actions, but the user doesn't need to know how it works internally
Encapsulation: A bank account has private data like balance, which can only be accessed through public methods
Q5. Write a SQL query to to print all the rows in a table that has no match in a second table.
SQL query to print rows with no match in a second table
Use LEFT JOIN to join the two tables
Filter the rows where the second table's primary key is NULL
SELECT the columns from the first table
Q6. What is the difference between final, finally and finalise?
Final, finally and finalise are related to completion or conclusion, but have different meanings and usage.
Final is an adjective used to describe the last or ultimate stage of something.
Finally is an adverb used to indicate the end of a process or event after a long wait or delay.
Finalise is a verb used to complete or finish something, often with a formal or official process.
Examples: The final exam, finally finished the project, finalise the contract.
Share interview questions and help millions of jobseekers 🌟
Q7. Given an array of unsorted values, search a value in the array and provide its space and time complexity? Is this the best way to search the value, why?
Searching an unsorted array for a value and determining its space and time complexity.
The time complexity of linear search is O(n), where n is the size of the array.
Binary search has a time complexity of O(log n), but requires a sorted array.
Hash tables can provide constant time complexity for search, but require additional space.
The best search method depends on the specific use case and constraints.
Example: Searching for a name in a list of names.
Q8. What is the difference between customer service and customer support
Customer service focuses on providing assistance and guidance to customers, while customer support deals with resolving technical issues and providing solutions.
Customer service involves addressing customer inquiries and concerns, providing information about products or services, and ensuring customer satisfaction.
Customer support involves troubleshooting technical issues, providing solutions to problems, and resolving customer complaints.
Customer service is more focused on b...read more
Associate/Senior Associate -(Technical) Jobs
0Q9. If you could bring any law into force what would it be and why?
I would bring a law to ensure equal pay for equal work regardless of gender.
The law would prohibit gender-based pay discrimination in all industries.
It would require employers to provide equal pay for employees who perform the same job with the same level of skill, effort, and responsibility.
This law would help to close the gender pay gap and promote gender equality in the workplace.
For example, in the United States, women earn only 82 cents for every dollar earned by men, an...read more
Q10. Space and time complexity of Sorting and Searching algos. Which algo is the best and why?
Sorting and searching algos have different space and time complexities. The best algo depends on the use case.
Sorting algos: Bubble sort, Insertion sort, Selection sort, Merge sort, Quick sort
Searching algos: Linear search, Binary search
Space complexity of sorting algos varies from O(1) to O(n), while time complexity varies from O(n^2) to O(nlogn)
Space complexity of searching algos is O(1), while time complexity is O(logn)
The best algo depends on the size of the data set, the...read more
Q11. Tell me about certificates authentication mechanism and encryption / Decryption mechanism in CPI?
Certificates authentication and encryption/decryption mechanisms are used in CPI for secure data transfer.
Certificates are used to authenticate the sender and receiver of data in CPI.
Encryption/decryption mechanisms are used to secure the data during transfer.
CPI supports various encryption algorithms such as AES, RSA, and SHA.
Certificates can be uploaded to CPI and used in communication channels for secure data transfer.
Q12. Given an array of unsorted values, write a program to replace each array index element with the next highest element.
Program to replace each array index element with the next highest element.
Sort the array in descending order
Loop through the array and replace each element with the next highest element
Handle edge cases like duplicates and last element
Q13. What is IP address and Mac address?
IP address is a unique identifier assigned to devices on a network. MAC address is a unique identifier assigned to network interfaces.
IP address stands for Internet Protocol address and is used to identify devices on a network
MAC address stands for Media Access Control address and is used to identify network interfaces
IP address is a 32-bit number, usually represented in dotted decimal notation (e.g. 192.168.0.1)
MAC address is a 48-bit number, usually represented in hexadecim...read more
Q14. What CPI related things have you worked on?
I have worked on CPI optimization and analysis for various software projects.
Implemented CPI reduction techniques like loop unrolling, pipelining, and cache optimization.
Analyzed CPI using performance profiling tools like perf and Intel VTune.
Worked on CPI optimization for a video encoding software, resulting in a 20% performance improvement.
Collaborated with hardware engineers to optimize CPI for a new processor architecture.
Developed a CPI benchmarking tool to compare the p...read more
Q15. What is a basic structure of our home internet?
The basic structure of home internet includes a modem, router, and devices connected to the network.
The modem connects to the internet service provider's network and converts the signal to one that can be used by the router.
The router creates a local network and allows multiple devices to connect to the internet.
Devices such as computers, smartphones, and smart home devices connect to the router via Wi-Fi or Ethernet cables.
The router manages the traffic between the devices a...read more
Q16. Do you have an idea about Cloud Computing?
Cloud computing is the delivery of computing services over the internet.
Cloud computing allows users to access data and applications from anywhere with an internet connection.
It eliminates the need for physical servers and hardware, reducing costs and increasing scalability.
Examples of cloud computing services include Amazon Web Services, Microsoft Azure, and Google Cloud Platform.
Q17. 2-3 design rounds eg- designing a food delivery app
Designing a food delivery app
Identify target audience and their needs
Create user-friendly interface for ordering food
Integrate payment gateway for easy transactions
Develop a tracking system for delivery status
Ensure timely delivery and quality of food
Implement customer feedback system for improvement
Partner with local restaurants for wider menu options
Q18. How to connect S4 HANA ECC system to CPI system?
To connect S4 HANA ECC system to CPI system, use SAP Cloud Connector and configure the connection in CPI.
Install and configure SAP Cloud Connector on the server where the S4 HANA ECC system is installed.
Create a destination in SAP Cloud Connector for the CPI system.
Configure the destination in CPI using the Cloud Connector details.
Test the connection to ensure successful integration.
Q19. Steps to be taken if you are in charge of improving working capital crunch
Steps to improve working capital crunch
Analyze cash flow and identify areas of improvement
Negotiate better payment terms with suppliers
Reduce inventory levels and optimize procurement process
Implement efficient billing and collection process
Explore financing options such as factoring or asset-based lending
Q20. Use Bit manipulation to check if integer is a power of 2
Use bitwise AND operator to check if integer is a power of 2.
A power of 2 has only one bit set in its binary representation.
Using bitwise AND operator with (n-1) will give 0 for powers of 2.
Example: 8 (1000) & 7 (0111) = 0, but 6 (0110) & 5 (0101) != 0.
Q21. What is difference between LED and LCD
LEDs are light emitting diodes that emit light when a current is passed through them, while LCDs are liquid crystal displays that use liquid crystals to display images.
LEDs are more energy-efficient than LCDs
LEDs have a longer lifespan than LCDs
LCDs have better color accuracy than LEDs
LEDs are commonly used in lighting while LCDs are used in displays
LEDs emit light in a specific direction while LCDs require a backlight to illuminate the display
Q22. Audit aspects to consider for confirming bank balance
Audit aspects to consider for confirming bank balance
Verify bank statements against accounting records
Confirm balances with the bank directly
Check for outstanding checks or deposits in transit
Reconcile any discrepancies
Review internal controls for cash handling and recording
Consider any fraud risks or red flags
Document all audit procedures and findings
Q23. How can we configure bios to DHCP
To configure BIOS to DHCP, access BIOS settings and enable DHCP option.
Enter BIOS settings by pressing the designated key during boot-up
Navigate to the Network or Ethernet settings
Enable the DHCP option
Save and exit BIOS settings
Q24. Code for a pattern he gave on spot
Code for a given pattern
Create an array of strings
Use loops to iterate over the rows and columns of the pattern
Fill the array with the appropriate characters based on the pattern
Return the array as the result
Q25. What is a HashMap?
HashMap is a data structure that stores key-value pairs and allows fast retrieval of values based on keys.
HashMap is part of the Java Collections Framework.
It uses hashing to store and retrieve elements.
It allows null values and null keys.
It is not synchronized by default, but can be made synchronized using Collections.synchronizedMap() method.
Example: HashMap
map = new HashMap<>(); map.put("apple", 1); map.put("banana", 2); int value = map.get("banana"); // returns 2
Q26. What technologies have you worked with
I have worked with a variety of technologies including Java, Python, SQL, and AWS.
Java
Python
SQL
AWS
Q27. What's server rack name, model, definition. Etc
A server rack is a framework used to hold and organize computer servers and other equipment.
Server racks come in various sizes and configurations.
They are designed to optimize space and airflow for efficient cooling.
Racks are often named after their height in rack units (U), such as a 42U rack.
Models can vary based on features such as cable management and power distribution.
Common brands include APC, Tripp Lite, and Dell.
Racks can also be customized for specific needs, such a...read more
Q28. Keys and areas of strength based on the application
Keys and areas of strength based on the application
Key areas of strength depend on the specific application
For a web application, key areas of strength may include scalability, security, and user experience
For a mobile application, key areas of strength may include performance, compatibility, and user interface
Other key areas of strength may include reliability, maintainability, and ease of use
Strengths should be aligned with the goals and requirements of the application
Q29. What is ip address and types
An IP address is a unique numerical identifier assigned to devices connected to a network.
IP stands for Internet Protocol
There are two types of IP addresses: IPv4 and IPv6
IPv4 addresses are 32-bit and IPv6 addresses are 128-bit
IPv4 addresses are written in decimal format, while IPv6 addresses are written in hexadecimal format
Examples of IPv4 addresses: 192.168.0.1, 172.16.254.1
Examples of IPv6 addresses: 2001:0db8:85a3:0000:0000:8a2e:0370:7334, fe80::1
Q30. Code for recurring numbers
Code for recurring numbers
Create an array to store the numbers
Loop through the array and check if a number is already present
If a number is found, add it to the recurring numbers array
Return the recurring numbers array
Q31. 1. How to debug spfx in SharePoint
Debugging SPFx in SharePoint involves using browser developer tools and Visual Studio Code.
Use browser developer tools to inspect and debug client-side code
Use Visual Studio Code to debug server-side code
Set breakpoints in code to pause execution and inspect variables
Use console.log() statements to output information to the console
Use the SharePoint Workbench to test and debug web parts
Use the gulp serve command to run the local development server
Check for errors in the conso...read more
Q32. Tell me about OOPS concepts
OOPS concepts are the fundamental principles of Object-Oriented Programming.
Encapsulation: bundling of data and methods that manipulate the data
Inheritance: creating new classes from existing ones
Polymorphism: ability of objects to take on multiple forms
Abstraction: hiding implementation details from the user
Example: A car class can have properties like color, model, and methods like start, stop, accelerate
Example: A child class can inherit properties and methods from a paren...read more
Q33. A clear idea of abstract class and interfaces
Abstract classes are classes that cannot be instantiated and can have both abstract and non-abstract methods. Interfaces are contracts that define a set of methods that a class must implement.
Abstract classes can have constructors, while interfaces cannot.
A class can implement multiple interfaces, but can only inherit from one abstract class.
Abstract classes can have instance variables, while interfaces cannot.
An example of an abstract class is the Shape class, with abstract ...read more
Q34. Explain event loop phases and one code snippet for the.
Event loop phases and code snippet explanation.
Event loop is a mechanism that allows JavaScript to perform non-blocking I/O operations.
It has six phases: Timers, I/O callbacks, idle, prepare, poll, and check.
Code snippet example: setInterval(() => console.log('Hello'), 1000);
Q35. What are the network topologies?
Network topologies refer to the arrangement of various elements in a network.
There are several types of network topologies, including bus, star, ring, mesh, and hybrid.
Bus topology involves connecting all devices to a single cable.
Star topology involves connecting all devices to a central hub or switch.
Ring topology involves connecting devices in a circular manner.
Mesh topology involves connecting devices to each other in a network.
Hybrid topology is a combination of two or m...read more
Q36. How to configure SFTP adapter?
To configure SFTP adapter, follow these steps:
Create a communication channel with SFTP adapter type
Provide the SFTP server details like hostname, port, username, password, and remote directory
Configure the sender/receiver agreement with the communication channel
Test the connection and transfer files
Q37. Difference between Work flow and Process builder
Workflow and Process Builder are automation tools in Salesforce. Workflow is a simple automation tool while Process Builder is more advanced.
Workflow is a simple automation tool that allows you to automate standard internal procedures and processes to save time across your org.
Process Builder is a more advanced automation tool that allows you to automate complex business processes and create custom logic.
Workflow can only perform a limited set of actions, such as updating fie...read more
Q38. What is a DSL?
DSL stands for Digital Subscriber Line, a technology that provides high-speed internet access over traditional copper telephone lines.
DSL uses existing telephone lines to transmit digital data
It provides faster internet speeds than dial-up connections
There are different types of DSL, such as ADSL, VDSL, and SDSL
DSL requires a DSL modem to connect to the internet
DSL is widely available in urban and suburban areas
Examples of DSL providers include AT&T, Verizon, and CenturyLink
Q39. What is protrat charges
Protrat charges are charges that are levied on a customer's account for exceeding the credit limit or for late payments.
Protrat charges are fees charged by financial institutions for late payments or exceeding credit limits.
These charges can vary depending on the institution and the type of account.
For example, a credit card may charge a higher protrat fee than a personal loan.
Protrat charges can add up quickly and can have a negative impact on a customer's credit score.
It is...read more
Q40. What is a Router?
A router is a networking device that forwards data packets between computer networks.
Routers operate at the network layer of the OSI model.
They use routing tables to determine the best path for data to travel.
Routers can connect different types of networks, such as LANs and WANs.
Examples of routers include Cisco, Netgear, and TP-Link.
Routers can also provide security features such as firewalls and VPNs.
Q41. difference between string and stringbuilder
String is immutable while StringBuilder is mutable.
String is a final class and cannot be modified once created.
StringBuilder is a mutable class and can be modified without creating a new object.
String concatenation creates a new String object each time, while StringBuilder can append to the same object.
String is thread-safe while StringBuilder is not.
Use String for small strings that won't change, and StringBuilder for large or frequently modified strings.
Q42. Do you know Java
Yes, I know Java.
Proficient in Java programming language
Experience in developing Java applications
Familiarity with Java frameworks such as Spring and Hibernate
Q43. What is up selling
Up selling is the practice of encouraging customers to purchase a more expensive or upgraded version of a product or service.
It involves suggesting additional features or add-ons to the customer
It can increase revenue and profit for the company
Examples include offering a larger size or better quality product, or suggesting a service package with more benefits
It should be done in a helpful and informative manner, not pushy or aggressive
Q44. Difference between SIP and H323
SIP and H323 are both protocols used for multimedia communication over IP networks.
SIP is a newer protocol and is more widely used for VoIP and video conferencing.
H323 is an older protocol and is mainly used for video conferencing.
SIP is simpler and more flexible than H323.
SIP uses HTTP-like messages while H323 uses binary messages.
SIP is easier to configure and troubleshoot than H323.
Examples of SIP-based applications include Skype, WhatsApp, and Google Voice.
Examples of H32...read more
Q45. Trade cycle in capital markets
Trade cycle in capital markets refers to the process of buying and selling securities.
The trade cycle starts with the issuance of securities by companies or governments.
Investors then buy these securities through primary markets.
These securities are then traded among investors in secondary markets.
The trade cycle ends when the securities are redeemed or mature.
Examples of securities include stocks, bonds, and derivatives.
Q46. What is open loop
Open loop is a control system where the output is not fed back to the input for correction or adjustment.
Open loop control does not rely on feedback to make adjustments.
It is a one-way communication system.
Examples include a toaster, where the heating element operates for a fixed duration regardless of the toast's actual temperature.
Another example is a washing machine with a timer that runs for a predetermined time without considering the clothes' cleanliness.
Q47. SOLID design principle
SOLID is a set of design principles for object-oriented programming.
S - Single Responsibility Principle: A class should have only one reason to change.
O - Open/Closed Principle: A class should be open for extension but closed for modification.
L - Liskov Substitution Principle: Subtypes should be substitutable for their base types.
I - Interface Segregation Principle: A client should not be forced to depend on methods it does not use.
D - Dependency Inversion Principle: High-lev...read more
Q48. Even and odd using two Thraeds
Using two threads, write a program to print even and odd numbers alternatively.
Create two threads, one for printing even numbers and the other for odd numbers
Use a shared variable to keep track of the current number to be printed
Use a loop to print the numbers alternatively
Use synchronization mechanisms like mutex or semaphore to avoid race conditions
Q49. Types of Audit opinions
Types of audit opinions include unqualified, qualified, adverse, and disclaimer.
Unqualified opinion: no material misstatements found
Qualified opinion: some issues found but not significant enough to affect overall opinion
Adverse opinion: significant issues found that affect overall opinion
Disclaimer: auditor unable to form an opinion due to lack of information or restrictions on scope
Examples: unqualified - clean audit report, adverse - going concern issues
Q50. Mainframe - Joinkeys in sort
Joinkeys is a utility in Mainframe SORT that allows merging of two or more files based on a common key.
Joinkeys is used to merge two or more files based on a common key.
It is used in Mainframe SORT utility.
Joinkeys can be used to merge files with different record formats.
It can also be used to merge files with different record lengths.
Joinkeys can be used to merge files with different sort orders.
Joinkeys can be used to merge files with different block sizes.
Top Interview Questions for Associate/Senior Associate -(Technical) Related Skills
Interview experiences of popular companies
Calculate your in-hand salary
Confused about how your in-hand salary is calculated? Enter your annual salary (CTC) and get your in-hand salary
Reviews
Interviews
Salaries
Users/Month