AST Consultant
100+ AST Consultant Interview Questions and Answers

Asked in TCS

Q. What is the difference between cache and persist in Spark?
Cache and persist are both used for optimizing Spark performance by storing intermediate results in memory, but persist allows for more customization.
Cache() is a shorthand for persist(StorageLevel.MEMORY_ONLY)
Persist() allows for specifying different storage levels such as MEMORY_ONLY, MEMORY_AND_DISK, etc.
Persist() also allows for specifying serialization formats like Java, Kryo, etc.

Asked in TCS

Q. Write Selenium Java code to identify broken links on a webpage.
Use Selenium Java code to identify broken links on a web page
Create a WebDriver instance using Selenium
Find all the links on the web page using findElements method
Iterate through each link and check for response code using HttpURLConnection class
Identify links with response code other than 200 as broken links

Asked in TCS

Q. What are the different types and their processes?
There are different types of consultants such as management, IT, financial, and HR consultants, each with their own unique processes.
Management consultants help organizations improve their performance through analysis and strategy implementation.
IT consultants provide technology solutions and support to businesses.
Financial consultants offer advice on financial planning, investments, and risk management.
HR consultants assist with human resource management, including recruitme...read more

Asked in TCS

Q. What are the methods for Requirements Gathering?
Methods for gathering requirements include interviews, surveys, observation, and prototyping.
Interviews with stakeholders to understand their needs and expectations
Surveys to gather feedback from a larger group of people
Observation of current processes and workflows
Prototyping to test and refine ideas
Brainstorming sessions to generate new ideas
Focus groups to gather feedback from a specific target audience
Document analysis to review existing documentation
JAD sessions to bring...read more

Asked in TCS

Q. Why did you choose TCS?
I chose TCS because of its global presence, diverse opportunities, and strong reputation in the industry.
TCS has a strong global presence with offices in over 46 countries, providing opportunities to work on international projects and collaborate with diverse teams.
TCS offers a wide range of career opportunities across various industries, allowing me to explore different domains and develop a versatile skillset.
TCS has a strong reputation in the IT industry, known for its inn...read more

Asked in TCS

Q. Write code for setter and getter methods.
Code for setters and getters methods
For each instance variable, create a setter and getter method
Setters should take in a parameter and assign it to the instance variable
Getters should return the value of the instance variable
Naming convention for setters and getters should follow camelCase
AST Consultant Jobs




Asked in TCS

Q. How do you fine-tune a query?
To fine tune a query, optimize the database, use indexes, limit the result set, and use appropriate joins.
Optimize the database by removing unnecessary data and improving data structure
Use indexes to speed up data retrieval
Limit the result set by using WHERE clause and pagination
Use appropriate joins to minimize the number of rows returned
Consider using caching to reduce database load

Asked in TCS

Q. How do you handle different situations during a project life cycle?
We handle different situations during project life cycle by identifying the issue, analyzing it, and implementing a solution.
Identify the issue or problem
Analyze the situation and gather information
Develop a plan of action
Implement the solution
Monitor and evaluate the results
Adjust the plan as necessary
Share interview questions and help millions of jobseekers 🌟

Asked in TCS

Q. Tell me about your automation test framework.
My automation test framework is built using Selenium WebDriver and TestNG for web applications.
Utilizes Selenium WebDriver for interacting with web elements
Uses TestNG for test case management and reporting
Includes page object model design pattern for better code organization
Integration with CI/CD tools like Jenkins for automated test execution

Asked in TCS

Q. Why is String immutable? Explain with code.
String is immutable in Java to ensure security, thread safety, and optimization.
String objects are stored in the String pool, which helps in memory optimization.
Immutable strings are thread-safe, as their values cannot be changed once created.
String immutability prevents malicious code from modifying sensitive data.
Example: String str = "Hello"; str.concat(" World"); // This does not change the original string value.

Asked in TCS

Q. What are the RICE objects you have worked on?
I have worked on RICE objects for various modules including FI, MM, and SD.
Developed custom reports using ALV and Smart Forms for FI module
Created custom transactions for MM module using BDC and BAPI
Enhanced standard SD transactions using user exits and BADI
Implemented custom workflows using SAP Workflow for various modules
Developed custom interfaces using IDOCs and RFCs

Asked in TCS

Q. What are the different types of network topology?
Different types of network topology include bus, star, ring, mesh, and hybrid.
Bus Topology: All devices are connected to a central cable, like a bus route.
Star Topology: All devices are connected to a central hub.
Ring Topology: Each device is connected to two other devices, forming a ring.
Mesh Topology: Every device is connected to every other device.
Hybrid Topology: Combination of two or more different types of topologies.

Asked in TCS

Q. What are the inspection types in SAP QM?
Inspection types in SAP QM include goods receipt inspection, goods issue inspection, and in-process inspection.
Goods receipt inspection is used to inspect materials received from vendors
Goods issue inspection is used to inspect materials before they are issued to production
In-process inspection is used to inspect materials during the production process

Asked in TCS

Q. Where are string memories allocated?
String memories are allocated in different places depending on the programming language and platform.
In C, string memories are allocated on the stack or heap depending on how they are declared.
In Java, string memories are allocated on the heap.
In Python, string memories are allocated on the heap and are managed by the interpreter.
In JavaScript, string memories are allocated on the heap and are managed by the garbage collector.

Asked in TCS

Q. How do you load a large file in ODI?
Large files can be loaded in ODI using various techniques such as partitioning, chunking, and parallel processing.
Use partitioning to divide the large file into smaller chunks and load them in parallel
Chunking involves breaking the large file into smaller pieces and loading them sequentially
Parallel processing can be used to load multiple chunks of the file simultaneously
ODI also supports external tables, which can be used to load data from large files stored outside the data...read more

Asked in TCS

Q. Explain the RANK, DENSE_RANK, and NTILE functions with examples.
Rank, dense rank, and ntile functions are used in SQL to assign a ranking to rows based on a specified criteria.
Rank function assigns a unique rank to each row based on the specified criteria.
Dense rank function assigns a unique rank to each row, but does not leave gaps in the ranking sequence.
Ntile function divides the result set into a specified number of groups and assigns a group number to each row.
Example: SELECT name, salary, RANK() OVER (ORDER BY salary DESC) AS rank F...read more

Asked in TCS

Q. How does consistent JKM work?
Consistent JKM ensures uniformity in the execution of tasks and processes.
JKM stands for Job Knowledge Management
Consistent JKM involves documenting and sharing best practices
It helps in reducing errors and improving efficiency
For example, a consistent JKM approach in software development would involve using the same coding standards and tools across the team

Asked in TCS

Q. How do you identify and resolve performance issues in production environments?
Performance issues in production environments are common and can be fixed by identifying the root cause, optimizing code, tuning database queries, and monitoring system resources.
Identify the root cause of the performance issue by analyzing logs, monitoring tools, and user reports.
Optimize code by removing unnecessary loops, improving algorithms, and reducing database calls.
Tune database queries by adding indexes, optimizing joins, and caching query results.
Monitor system res...read more

Asked in TCS

Q. How do we take a screenshot in Selenium?
Screenshots in Selenium can be taken using the getScreenshotAs method of the WebDriver interface.
Use the getScreenshotAs method of the WebDriver interface to capture the screenshot.
Save the screenshot as a file using the FileUtils class.
Handle exceptions like IOException when saving the screenshot.

Asked in TCS

Q. How would you automate a dropdown menu?
To automate a drop down, you can use tools like Selenium WebDriver to interact with the drop down element and select options programmatically.
Use Selenium WebDriver to locate the drop down element on the webpage
Identify the options within the drop down using findElements method
Use select class in Selenium to interact with the drop down and select desired option

Asked in TCS

Q. What are the different methods available in the Alert class?
The Alert class in Java provides different methods to display alerts or messages to the user.
The showMessageDialog() method displays a message dialog with an OK button.
The showConfirmDialog() method displays a confirmation dialog with Yes/No buttons.
The showOptionDialog() method displays a customized dialog with options to choose from.
The showInputDialog() method displays an input dialog to get input from the user.
The showErrorDialog() method displays an error dialog with an ...read more

Asked in TCS

Q. How do you prioritize the requirements?
Requirements are prioritized based on their importance and impact on project goals.
Identify critical requirements that are necessary for project success
Consider the impact of each requirement on project timelines and budget
Involve stakeholders in the prioritization process
Use a scoring system to rank requirements based on their importance
Revisit and adjust priorities as needed throughout the project

Asked in Infosys

Q. How do you create custom annotations?
Custom annotations can be created using the @interface keyword in Java.
Create a new interface with the @interface keyword
Define the annotation's properties using methods
Add default values for the properties
Add the @Retention and @Target annotations to specify how the annotation can be used
Example: @interface MyAnnotation { String value() default ""; }
Example usage: @MyAnnotation(value="example")

Asked in TCS

Q. How do you optimize SQL queries using execution plans and indexes?
Optimizing SQL queries involves analyzing execution plans and creating appropriate indexes for performance improvement.
Analyze the execution plan to identify slow operations like full table scans.
Create indexes on columns used in WHERE clauses to speed up data retrieval. Example: CREATE INDEX idx_column ON table_name(column);
Consider composite indexes for queries filtering on multiple columns. Example: CREATE INDEX idx_composite ON table_name(column1, column2);
Use covering in...read more

Asked in TCS

Q. What is the difference between M365 and Office 365?
M365 and Office 365 are both productivity suites, but M365 includes additional features like Windows 10 and Enterprise Mobility + Security.
M365 includes Office 365, Windows 10, and Enterprise Mobility + Security.
Office 365 is focused on cloud-based productivity tools like Word, Excel, and PowerPoint.
M365 offers advanced security and device management capabilities.
Office 365 plans are available for personal, business, and enterprise use.
M365 is designed for businesses and incl...read more

Asked in TCS

Q. What is the difference between static lookup and dynamic lookup?
Static look up is done at compile time while dynamic look up is done at runtime.
Static look up is determined at compile time based on the code structure.
Dynamic look up is determined at runtime based on the actual data or conditions.
Example: Static look up in a switch statement with fixed cases, dynamic look up in a database query with changing parameters.

Asked in TCS

Q. What is a dynamic modification rule?
Dynamic modification rule is a rule that allows changes to be made to a system or process in real-time based on certain conditions.
Dynamic modification rules are used in various industries to automate processes and improve efficiency.
These rules can be programmed to trigger specific actions based on predefined criteria.
For example, in e-commerce, a dynamic modification rule can adjust pricing based on demand or competitor prices.
In healthcare, dynamic modification rules can b...read more

Asked in TCS

Q. Which roles have you worked upon?
I have worked in various roles including project management, data analysis, and client engagement across multiple industries.
Project Management: Led a team to deliver a software solution for a healthcare client, improving efficiency by 30%.
Data Analysis: Analyzed market trends for a retail client, providing insights that increased sales by 15%.
Client Engagement: Managed relationships with key stakeholders, ensuring alignment on project goals and timelines.

Asked in TCS

Q. Mail flow in hybrid deployment.
Mail flow in hybrid deployment
In hybrid deployment, mail flow can be routed through on-premises Exchange servers or Exchange Online
Mail can be sent between on-premises and cloud mailboxes using connectors
Exchange Online Protection (EOP) can be used for inbound and outbound mail filtering
Transport Layer Security (TLS) can be used to secure mail flow between on-premises and cloud
Mail can be redirected to on-premises servers for compliance or archiving purposes

Asked in TCS

Q. Explain the basic pillars of Cyber Security
The basic pillars of Cyber Security include confidentiality, integrity, availability, and non-repudiation.
Confidentiality: Ensuring that data is only accessible to authorized individuals or systems.
Integrity: Ensuring that data is accurate and has not been tampered with.
Availability: Ensuring that data and systems are accessible when needed.
Non-repudiation: Ensuring that a sender cannot deny sending a message and a recipient cannot deny receiving it.
Interview Experiences of Popular Companies





Top Interview Questions for AST Consultant Related Skills



Reviews
Interviews
Salaries
Users

