Associate/Senior Associate -(Technical)
50+ Associate/Senior Associate -(Technical) Interview Questions and Answers

Asked in NTT Data

Q. What are the different types of Database management systems. What are the Database languages ? What is the difference between drop, delete and truncate?
Different types of DBMS, DB languages & difference between drop, delete & truncate.
Types of DBMS: Relational, NoSQL, Object-oriented, Hierarchical, Network, etc.
Database languages: SQL, PL/SQL, T-SQL, etc.
DROP: Deletes a table and its data, cannot be rolled back.
DELETE: Deletes rows from a table, can be rolled back.
TRUNCATE: Deletes all rows from a table, cannot be rolled back.

Asked in Cognizant

Q. 1.Difference between role and profile, 2. For what level of owd the share object will be available fo an object in apex sharing. 3.How to check fls in apex class.4. With sharing also consider fls in apex class?...
read moreTechnical interview questions on Apex, Aura and Webservices
Role defines the responsibilities and expectations of a position, while profile defines the access and permissions of a user
Share object is available for the same OWD level or higher
FLS can be checked using the Schema.DescribeFieldResult class in Apex
FLS is considered even with sharing in Apex class
Webservices callout can be done using the fetch() method in LWC or using the HttpRequest class in Apex
Application events ...read more
Associate/Senior Associate -(Technical) Interview Questions and Answers for Freshers

Asked in Taj Hotels Resorts and Palaces

Q. Tell me all chemicals name with their use and proper dilution
It is not possible to list all chemicals with their use and proper dilution in a single answer.
Chemicals have various uses and dilutions depending on the industry and application.
Some common chemicals and their uses include bleach for disinfecting, ammonia for cleaning, and hydrogen peroxide for wound care.
Proper dilution depends on the specific chemical and its intended use, and should be followed according to the manufacturer's instructions.
It is important to handle chemica...read more

Asked in NTT Data

Q. Give a real-time example of Inheritance, Polymorphism, Abstraction, and Encapsulation.
Real-time examples of OOP concepts
Inheritance: A car is a vehicle, inheriting properties of a vehicle
Polymorphism: A shape can be a square or a circle, both implementing the same area method
Abstraction: A TV remote has buttons to perform actions, but the user doesn't need to know how it works internally
Encapsulation: A bank account has private data like balance, which can only be accessed through public methods

Asked in NTT Data

Q. Write a SQL query to print all the rows in a table that have no match in a second table.
SQL query to print rows with no match in a second table
Use LEFT JOIN to join the two tables
Filter the rows where the second table's primary key is NULL
SELECT the columns from the first table

Asked in IBM

Q. What is the difference between final, finally, and finalize?
Final, finally and finalise are related to completion or conclusion, but have different meanings and usage.
Final is an adjective used to describe the last or ultimate stage of something.
Finally is an adverb used to indicate the end of a process or event after a long wait or delay.
Finalise is a verb used to complete or finish something, often with a formal or official process.
Examples: The final exam, finally finished the project, finalise the contract.

Asked in RateGain

Q. Given an array of unsorted values, search a value in the array and provide its space and time complexity? Is this the best way to search the value, why?
Searching an unsorted array for a value and determining its space and time complexity.
The time complexity of linear search is O(n), where n is the size of the array.
Binary search has a time complexity of O(log n), but requires a sorted array.
Hash tables can provide constant time complexity for search, but require additional space.
The best search method depends on the specific use case and constraints.
Example: Searching for a name in a list of names.

Asked in Tech Mahindra

Q. What is the difference between customer service and customer support?
Customer service focuses on providing assistance and guidance to customers, while customer support deals with resolving technical issues and providing solutions.
Customer service involves addressing customer inquiries and concerns, providing information about products or services, and ensuring customer satisfaction.
Customer support involves troubleshooting technical issues, providing solutions to problems, and resolving customer complaints.
Customer service is more focused on b...read more
Share interview questions and help millions of jobseekers 🌟

Asked in UnitedLex

Q. If you could bring any law into force, what would it be and why?
I would bring a law to ensure equal pay for equal work regardless of gender.
The law would prohibit gender-based pay discrimination in all industries.
It would require employers to provide equal pay for employees who perform the same job with the same level of skill, effort, and responsibility.
This law would help to close the gender pay gap and promote gender equality in the workplace.
For example, in the United States, women earn only 82 cents for every dollar earned by men, an...read more

Asked in RateGain

Q. Space and time complexity of Sorting and Searching algos. Which algo is the best and why?
Sorting and searching algos have different space and time complexities. The best algo depends on the use case.
Sorting algos: Bubble sort, Insertion sort, Selection sort, Merge sort, Quick sort
Searching algos: Linear search, Binary search
Space complexity of sorting algos varies from O(1) to O(n), while time complexity varies from O(n^2) to O(nlogn)
Space complexity of searching algos is O(1), while time complexity is O(logn)
The best algo depends on the size of the data set, the...read more

Asked in Cognizant

Q. Tell me about certificate authentication mechanisms and encryption/decryption mechanisms in CPI.
Certificates authentication and encryption/decryption mechanisms are used in CPI for secure data transfer.
Certificates are used to authenticate the sender and receiver of data in CPI.
Encryption/decryption mechanisms are used to secure the data during transfer.
CPI supports various encryption algorithms such as AES, RSA, and SHA.
Certificates can be uploaded to CPI and used in communication channels for secure data transfer.

Asked in Conceptia Software Technologies

Q. What could cause a laptop to have no power, no POST, and no video output?
No power, no post, no video indicates a laptop's failure to start, showing no signs of life or display.
No Power: Laptop does not turn on at all; no lights or sounds.
No POST: Laptop powers on but fails to complete the Power-On Self-Test, indicated by no BIOS screen.
No Video: Laptop powers on and POSTs, but the display remains blank; could be due to a faulty screen or GPU.
Example: A laptop plugged in shows no LED indicators, suggesting a power supply issue.
Example: A laptop tur...read more

Asked in RateGain

Q. Given an array of unsorted values, write a program to replace each array index element with the next highest element.
Program to replace each array index element with the next highest element.
Sort the array in descending order
Loop through the array and replace each element with the next highest element
Handle edge cases like duplicates and last element

Asked in Cognizant

Q. How do you connect an S4 HANA ECC system to a CPI system?
To connect S4 HANA ECC system to CPI system, use SAP Cloud Connector and configure the connection in CPI.
Install and configure SAP Cloud Connector on the server where the S4 HANA ECC system is installed.
Create a destination in SAP Cloud Connector for the CPI system.
Configure the destination in CPI using the Cloud Connector details.
Test the connection to ensure successful integration.

Asked in NR Technoserve

Q. What is IP address and Mac address?
IP address is a unique identifier assigned to devices on a network. MAC address is a unique identifier assigned to network interfaces.
IP address stands for Internet Protocol address and is used to identify devices on a network
MAC address stands for Media Access Control address and is used to identify network interfaces
IP address is a 32-bit number, usually represented in dotted decimal notation (e.g. 192.168.0.1)
MAC address is a 48-bit number, usually represented in hexadecim...read more

Asked in Cognizant

Q. What CPI related things have you worked on?
I have worked on CPI optimization and analysis for various software projects.
Implemented CPI reduction techniques like loop unrolling, pipelining, and cache optimization.
Analyzed CPI using performance profiling tools like perf and Intel VTune.
Worked on CPI optimization for a video encoding software, resulting in a 20% performance improvement.
Collaborated with hardware engineers to optimize CPI for a new processor architecture.
Developed a CPI benchmarking tool to compare the p...read more

Asked in Tech Mahindra

Q. What is the basic structure of a home internet network?
The basic structure of home internet includes a modem, router, and devices connected to the network.
The modem connects to the internet service provider's network and converts the signal to one that can be used by the router.
The router creates a local network and allows multiple devices to connect to the internet.
Devices such as computers, smartphones, and smart home devices connect to the router via Wi-Fi or Ethernet cables.
The router manages the traffic between the devices a...read more

Asked in PwC

Q. Do you have an idea about Cloud Computing?
Cloud computing is the delivery of computing services over the internet.
Cloud computing allows users to access data and applications from anywhere with an internet connection.
It eliminates the need for physical servers and hardware, reducing costs and increasing scalability.
Examples of cloud computing services include Amazon Web Services, Microsoft Azure, and Google Cloud Platform.

Asked in Goldman Sachs

Q. 2-3 design rounds eg- designing a food delivery app
Designing a food delivery app
Identify target audience and their needs
Create user-friendly interface for ordering food
Integrate payment gateway for easy transactions
Develop a tracking system for delivery status
Ensure timely delivery and quality of food
Implement customer feedback system for improvement
Partner with local restaurants for wider menu options

Asked in PwC

Q. What steps would you take to improve a working capital crunch?
Steps to improve working capital crunch
Analyze cash flow and identify areas of improvement
Negotiate better payment terms with suppliers
Reduce inventory levels and optimize procurement process
Implement efficient billing and collection process
Explore financing options such as factoring or asset-based lending

Asked in Tech Mahindra

Q. What are some basic troubleshooting tips for internet problems?
Basic troubleshooting tips for internet problems
Check if other devices are able to connect to the internet
Restart the router/modem
Check for any loose cables or connections
Clear browser cache and cookies
Disable any VPN or proxy settings
Run a virus scan on the device
Contact the internet service provider for assistance

Asked in Samsung

Q. Given an integer, use bit manipulation to check if it is a power of 2.
Use bitwise AND operator to check if integer is a power of 2.
A power of 2 has only one bit set in its binary representation.
Using bitwise AND operator with (n-1) will give 0 for powers of 2.
Example: 8 (1000) & 7 (0111) = 0, but 6 (0110) & 5 (0101) != 0.

Asked in Sony

Q. What is the difference between LED and LCD?
LEDs are light emitting diodes that emit light when a current is passed through them, while LCDs are liquid crystal displays that use liquid crystals to display images.
LEDs are more energy-efficient than LCDs
LEDs have a longer lifespan than LCDs
LCDs have better color accuracy than LEDs
LEDs are commonly used in lighting while LCDs are used in displays
LEDs emit light in a specific direction while LCDs require a backlight to illuminate the display

Asked in PwC

Q. What audit aspects should be considered when confirming a bank balance?
Audit aspects to consider for confirming bank balance
Verify bank statements against accounting records
Confirm balances with the bank directly
Check for outstanding checks or deposits in transit
Reconcile any discrepancies
Review internal controls for cash handling and recording
Consider any fraud risks or red flags
Document all audit procedures and findings

Asked in Conceptia Software Technologies

Q. How can we configure BIOS to use DHCP?
To configure BIOS to DHCP, access BIOS settings and enable DHCP option.
Enter BIOS settings by pressing the designated key during boot-up
Navigate to the Network or Ethernet settings
Enable the DHCP option
Save and exit BIOS settings

Asked in Infosys

Q. What is a HashMap?
HashMap is a data structure that stores key-value pairs and allows fast retrieval of values based on keys.
HashMap is part of the Java Collections Framework.
It uses hashing to store and retrieve elements.
It allows null values and null keys.
It is not synchronized by default, but can be made synchronized using Collections.synchronizedMap() method.
Example: HashMap
map = new HashMap<>(); map.put("apple", 1); map.put("banana", 2); int value = map.get("banana"); // returns 2

Asked in e-Labs InfoTech Private Limited

Q. What technologies have you worked with?
I have worked with a variety of technologies including Java, Python, SQL, and AWS.
Java
Python
SQL
AWS

Asked in Ugam Solution

Q. Write code to generate the pattern provided.
Code for a given pattern
Create an array of strings
Use loops to iterate over the rows and columns of the pattern
Fill the array with the appropriate characters based on the pattern
Return the array as the result

Asked in Genpact

Q. What's server rack name, model, definition. Etc
A server rack is a framework used to hold and organize computer servers and other equipment.
Server racks come in various sizes and configurations.
They are designed to optimize space and airflow for efficient cooling.
Racks are often named after their height in rack units (U), such as a 42U rack.
Models can vary based on features such as cable management and power distribution.
Common brands include APC, Tripp Lite, and Dell.
Racks can also be customized for specific needs, such a...read more

Asked in Deloitte

Q. Keys and areas of strength based on the application
Keys and areas of strength based on the application
Key areas of strength depend on the specific application
For a web application, key areas of strength may include scalability, security, and user experience
For a mobile application, key areas of strength may include performance, compatibility, and user interface
Other key areas of strength may include reliability, maintainability, and ease of use
Strengths should be aligned with the goals and requirements of the application
Interview Experiences of Popular Companies





Top Interview Questions for Associate/Senior Associate -(Technical) Related Skills



Reviews
Interviews
Salaries
Users

