Premium Employer

Infosys

3.7
based on 35.5k Reviews
Filter interviews by

100+ Interview Questions and Answers

Updated 9 Nov 2024
Popular Designations

Q1. Suppose there are two tables: A Customer table and an Order table. The Order table has a column OrderID CustomerID, OrderStatus, and TotalAmount. The Customer table has the columns CustomerID, CustomerName, Pho...

read more
Ans.
Query to print CustomerID, CustomerName, OrderStatus, and TotalAmount excluding orders placed in August. Join Customer and Order tables on CustomerID Filter out orders placed in August using WHERE clause Select CustomerID, CustomerName, OrderStatus, and TotalAmount columns
Add your answer

Q2. tell me security vulnerabilities that you have fixed in your project?

Ans.
I have fixed security vulnerabilities related to SQL injection, cross-site scripting, and insecure direct object references. Implemented input validation to prevent SQL injection attacks Escaped user input to prevent cross-site scripting attacks Implemented access controls to prevent insecure direct object references Regularly updated security patches and libraries
Add your answer

Q3. what are challenges faced while migrating java 8 to java 17?

Ans.
Challenges faced while migrating Java 8 to Java 17 include compatibility issues, deprecated APIs, and potential performance impacts. Compatibility issues with third-party libraries and frameworks Deprecated APIs in Java 8 that may have been removed or changed in Java 17 Potential performance impacts due to changes in the JVM or compiler optimizations
Add your answer

Q4. What is the approach of consulting If I have to select between Power bi and tableau.. What are the factors I will consider? Discussion on resume

Ans.
Consulting approach involves analyzing problems, providing solutions and implementing them. Understand client's needs and goals Analyze data and identify key insights Develop recommendations and solutions Implement solutions and monitor progress Factors to consider when choosing between Power BI and Tableau include cost, ease of use, data visualization capabilities, and integration with other tools Resume should highlight relevant experience and skills in consulting and data...
read more
Add your answer
Discover null interview dos and don'ts from real experiences

Q5. How to consume SOAP web services in mule and implement security header for WSDL.

Ans.
To consume SOAP web services in Mule and implement security header for WSDL, you can use the MuleSoft Secure Configuration Properties. Use MuleSoft Secure Configuration Properties to configure security headers in the Mule flow. Add a security header to the SOAP request using the element in the Mule configuration file. Configure the security header properties such as username, password, encryption, etc., in the MuleSoft Secure Configuration Properties file. Ensure that the WS...
read more
Add your answer

Q6. Is it possible to achieve method overloading within a private class in Java?

Ans.
No, method overloading is not possible within a private class in Java. Method overloading is achieved by having multiple methods in the same class with the same name but different parameters. Private methods are not visible outside the class, so overloading them would not be useful. If you need to achieve method overloading, the methods should be public or protected.
View 1 answer
Are these interview questions helpful?

Q7. What regulatory requirements are most commonly taken care of by the tech stack and IT software in an Insurer's business?

Ans.
Tech stack and IT software in an Insurer's business commonly handle regulatory requirements such as data security, compliance reporting, and customer data protection. Data security measures to protect sensitive customer information Compliance reporting to ensure adherence to industry regulations Customer data protection to safeguard personal information Automated regulatory compliance checks to monitor and enforce regulatory requirements
Add your answer

Q8. How do you understand the integration of asset managers with insurers operating in a Life and Pensions space?

Ans.
Asset managers and insurers in Life and Pensions space collaborate to optimize investment strategies and manage risks. Asset managers help insurers optimize investment portfolios to meet long-term liabilities. Insurers provide asset managers with stable, long-term capital to invest. Collaboration involves aligning investment strategies with insurance liabilities and risk management. Asset managers may offer specialized investment products tailored to insurers' needs. Integra...
read more
Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What is the logic of the code for finding duplicate numbers in an array?

Ans.
Code logic to find duplicate numbers in an array Iterate through the array and store each element in a hash set If an element is already in the hash set, it is a duplicate Return the set of duplicate numbers found
Add your answer

Q10. what is the solution for resolving conflicts in a git merge?

Ans.
Conflicts in a git merge can be resolved by manually editing the conflicting files and then committing the changes. Use 'git status' to identify the conflicting files Open the conflicting files in a text editor and resolve the conflicts manually Use 'git add' to stage the resolved files Commit the changes using 'git commit'
Add your answer

Q11. Which tree is used in TreeMap and what is the implementation of it?

Ans.
TreeMap in Java uses Red-Black tree for implementation. TreeMap in Java uses Red-Black tree for implementation Red-Black tree is a self-balancing binary search tree Red-Black tree ensures logarithmic time complexity for operations like get, put, remove
Add your answer

Q12. What is the inversion of control and how does it work?

Ans.
Inversion of control is a design principle where the control flow of a program is inverted, with the framework or container calling the code instead of the code calling the framework. Inversion of control allows for decoupling of components, making the code more modular and easier to maintain. Common examples of inversion of control include dependency injection and event-driven programming. Inversion of control is often used in frameworks like Spring in Java or Angular in Ja...
read more
Add your answer

Q13. What are the types of joins and what is the difference between them?

Ans.
Types of joins in SQL include inner join, outer join (left, right, full), cross join, and self join. Inner join: returns rows when there is a match in both tables based on the join condition. Outer join: returns all rows from one table and only matching rows from the other table. Left outer join: returns all rows from the left table and the matched rows from the right table. Right outer join: returns all rows from the right table and the matched rows from the left table. Ful...
read more
Add your answer

Q14. What is your understanding of the agile framework? What are the methodologies applied in agile projects?

Ans.
Agile framework is a project management approach that emphasizes flexibility, collaboration, and iterative development. Agile framework focuses on delivering value to customers through continuous collaboration and adaptation. Common methodologies in agile projects include Scrum, Kanban, and Extreme Programming (XP). Scrum involves short, time-boxed iterations called sprints, with daily stand-up meetings and regular reviews. Kanban visualizes work in progress on a board, with...
read more
Add your answer

Q15. In writing new policies, what factors affect the underwriting process across various LOBs? How can we increase the depth and visibility for these factors?

Ans.
Factors affecting underwriting process and increasing visibility in new policy writing Factors affecting underwriting process include risk assessment, regulatory requirements, market trends, and customer demographics Increasing depth and visibility can be achieved through data analytics, automation, and collaboration between underwriters and other departments For example, using predictive modeling to assess risk factors or implementing a centralized platform for underwriting...
read more
Add your answer

Q16. How to implement retry mechanism for external system connection.

Ans.
Implement retry mechanism for external system connection Use a loop to attempt connection multiple times Include a delay between each retry to avoid overwhelming the external system Set a maximum number of retry attempts to prevent infinite loops Consider implementing exponential backoff for retries to gradually increase the time between attempts
Add your answer

Q17. How to handle System API error handling in Experience API.

Ans.
Handle System API errors in Experience API by implementing proper error handling techniques. Implement try-catch blocks to catch and handle exceptions thrown by System APIs. Use status codes and error messages to communicate errors to the user. Log detailed error information for troubleshooting purposes. Provide user-friendly error messages to guide users on how to resolve the issue. Consider implementing retry mechanisms for transient errors.
Add your answer

Q18. Can we use same API Id in two different applications.

Ans.
No, API Id should be unique to avoid conflicts and ensure proper functioning of applications. API Id should be unique to avoid conflicts in data retrieval and processing. Using the same API Id in two different applications can lead to errors and unexpected behavior. Each application should have its own unique API Id to maintain clarity and organization. For example, Application A should have API Id '123' and Application B should have API Id '456'.
Add your answer

Q19. How to configure and manage mule application application log.

Ans.
To configure and manage Mule application logs, you can use log4j configuration in the Mule project. Use log4j configuration file to define log levels, appenders, and log format. Add log4j configuration file to src/main/resources folder in Mule project. Configure log4j properties like log level, log file location, and log format. Use Mule properties to dynamically change log levels in different environments.
Add your answer

Q20. Tell me the flow of HTTP requests for the backend in Java.

Ans.
HTTP requests in Java backend flow from client to server through various layers like servlets, filters, and controllers. Client sends HTTP request to server Request is received by servlet container (e.g. Tomcat) Servlet container forwards request to appropriate servlet based on URL mapping Servlet processes request and generates response Response is sent back to client
Add your answer

Q21. What makes a claim more or less important to an insurer across various LOBs?

Ans.
The importance of a claim to an insurer varies across different lines of business (LOBs) based on factors like severity, frequency, and potential impact on profitability. Severity of the claim - High severity claims may be more important as they can result in significant payouts. Frequency of the claim - Higher frequency of claims in a particular LOB may indicate underlying issues that need to be addressed. Potential impact on profitability - Claims that have the potential t...
read more
Add your answer

Q22. Internal working of HashSet, HashMap vs HashTable, Tell the output for a code snippet based on Arraylist, what is an IoC container, questions on Spring boot annotations, Current project details

Ans.
The question covers topics like internal working of HashSet, HashMap vs HashTable, IoC container, Spring boot annotations, and current project details. HashSet is implemented using a hash table, HashMap is implemented using a hash table with key-value pairs, and HashTable is a synchronized version of HashMap. ArrayList is a dynamic array that can grow or shrink in size, and the output of a code snippet depends on the specific code being executed. IoC container stands for Inv...
read more
Add your answer

Q23. Different reports in grc, connectors, plugin, what to do if script button is disabled, auth checks when user executes tcode.

Ans.
The question is about different reports in GRC, connectors, plugins, handling disabled script buttons, and authorization checks when executing transactions. Different reports in GRC provide insights into compliance and risk management. Connectors and plugins are used to integrate GRC systems with other software applications. If the script button is disabled, check user permissions and system settings. Authorization checks ensure that users have the necessary rights to execut...
read more
Add your answer

Q24. Why is object creation not possible for abstract classes?

Ans.
Object creation is not possible for abstract classes because they cannot be instantiated directly. Abstract classes are meant to be used as base classes for other classes to inherit from. They contain abstract methods that must be implemented by the child classes. Attempting to create an object of an abstract class will result in a compilation error. Example: abstract class Shape { abstract void draw(); }
Add your answer

Q25. What are the key differences between LinkedList and HashSet?

Ans.
LinkedList is a linear data structure that stores elements in a sequential order, while HashSet is a collection that does not allow duplicate elements. LinkedList maintains the insertion order of elements, while HashSet does not guarantee any specific order. LinkedList allows duplicate elements, while HashSet does not allow duplicates. LinkedList uses pointers to connect elements, while HashSet uses a hash table for storing elements. Example: LinkedList linkedList = new Link...
read more
Add your answer

Q26. What are the different types of dependency injection?

Ans.
Dependency injection is a design pattern in which an object receives other objects that it depends on. Constructor injection: Dependencies are provided through a class constructor. Setter injection: Dependencies are set through setter methods. Interface injection: Dependencies are set through an interface. Example: In constructor injection, a class may have a constructor that takes the dependencies as parameters.
Add your answer

Q27. What is the flow of dependency injection in Spring Boot?

Ans.
Dependency injection in Spring Boot allows objects to be injected into a class, promoting loose coupling and easier testing. In Spring Boot, dependency injection is achieved through @Autowired annotation. Dependencies are managed by the Spring container and injected into classes at runtime. Constructor injection, setter injection, and field injection are common ways to inject dependencies in Spring Boot. Example: @Autowired private UserService userService; // Field injection...
read more
Add your answer

Q28. What is the difference between @RestController and @Request mapping?

Ans.
Difference between @RestController and @RequestMapping RestController is a specialized version of @Controller that includes @ResponseBody by default @RequestMapping is used to map web requests to specific handler methods RestController is typically used for RESTful web services, while @RequestMapping can be used for any type of web request handling
Add your answer

Q29. what is the difference between stream and collection in Java?

Ans.
Streams represent a sequence of elements and support functional-style operations, while collections are data structures that store and manipulate groups of objects. Streams are used for processing sequences of elements, while collections are used for storing and manipulating groups of objects. Streams support functional-style operations like filter, map, reduce, while collections provide methods like add, remove, get. Streams are lazy, meaning they don't store elements, whil...
read more
Add your answer

Q30. what is a trigger in SQL and how is it used?

Ans.
A trigger in SQL is a special type of stored procedure that is automatically executed when certain events occur in a database. Triggers can be used to enforce business rules, maintain referential integrity, and automate repetitive tasks. There are two main types of triggers in SQL: BEFORE triggers and AFTER triggers. An example of a trigger is a BEFORE INSERT trigger that automatically sets a default value for a column if no value is provided.
Add your answer

Q31. If you find a bug in production system how will you handle it

Ans.
I would immediately notify the appropriate team, document the bug, and work on a fix to deploy as soon as possible. Notify the appropriate team or individual responsible for handling production issues Document the bug thoroughly, including steps to reproduce and impact on system Work on a fix or workaround to deploy as soon as possible Communicate with stakeholders about the issue and resolution progress
Add your answer

Q32. 1.Process of maintain custom transaction cose in SAP. 2.What is S_TABU_DIS , S_TABU_NAM? 3.What is authorization group? What is the table to view authorization group? 4.Difference between ST01 and STAUTHTRACE?

Ans.
Answers to questions related to SAP custom transaction code maintenance and authorization groups. Custom transaction codes can be maintained using transaction code SE93 S_TABU_DIS is a table that stores authorization objects for table maintenance and S_TABU_NAM is a table that stores authorization objects for table display Authorization group is a field used to group objects for authorization purposes. Table TBRG is used to view authorization groups ST01 is used to trace use...
read more
Add your answer

Q33. how do you have if an issue occur in production

Ans.
Monitor production systems for any issues and respond promptly Set up monitoring tools to alert on any anomalies or errors Regularly review logs and metrics to proactively identify potential issues Establish incident response procedures to quickly address and resolve any production issues Collaborate with cross-functional teams to investigate and troubleshoot issues Implement automated testing and deployment processes to catch issues before they reach production
Add your answer

Q34. How to handle error for Scatter Gatter component.

Ans.
Handle errors in Scatter Gatter component by using try-catch blocks and displaying error messages to the user. Use try-catch blocks to catch errors in the Scatter Gatter component. Display informative error messages to the user when an error occurs. Handle different types of errors such as data loading errors or rendering errors. Implement error logging to track and troubleshoot errors in the Scatter Gatter component.
Add your answer

Q35. Can we use resource type in trait in RAML

Ans.
Yes, resource types can be used in traits in RAML. Resource types can be defined and reused in traits to avoid duplication of code. By using resource types in traits, you can define common characteristics and behaviors that can be applied to multiple resources. Example: defining a resource type for authentication and then using it in multiple resources.
Add your answer

Q36. What is the core difference between agile and waterfall

Ans.
Agile is iterative and flexible, while waterfall is linear and rigid. Agile focuses on delivering working software in short iterations Waterfall follows a sequential process with distinct phases Agile encourages collaboration and adaptability Waterfall emphasizes planning and documentation Agile is better suited for complex and rapidly changing projects Waterfall is better suited for projects with well-defined requirements and scope
Add your answer

Q37. How can we sort and segregate Insurance claims for prioritization?

Ans.
Insurance claims can be sorted and segregated based on urgency and complexity using automated algorithms and machine learning models. Utilize machine learning algorithms to predict urgency and complexity of claims Segment claims based on criteria such as type of insurance, claim amount, and policyholder history Prioritize claims with potential fraud indicators or high financial impact Automate the sorting process to increase efficiency and accuracy
Add your answer

Q38. Write a trigger to create a contact whenever a account is created

Ans.
Create a trigger to automatically create a contact when an account is created Use Apex trigger on Account object Query the necessary information from the Account record Create a new Contact record with the relevant information Insert the Contact record
Add your answer

Q39. What is the purpose of exception handling in Java?

Ans.
Exception handling in Java is used to handle runtime errors and prevent program crashes. Purpose is to handle runtime errors and prevent program crashes Allows for graceful handling of unexpected situations Helps in separating error-handling code from regular code Improves code readability and maintainability Examples: try-catch blocks, throw keyword, finally block
Add your answer

Q40. How do you call a private method in another class?

Ans.
You can call a private method in another class by using reflection in Java. Use the getDeclaredMethod() method from the Class class to get the private method Set the accessibility of the private method to true using the setAccessible() method Invoke the private method using the invoke() method
Add your answer

Q41. What is the purpose of dependence injection?

Ans.
Dependency injection is a design pattern used to remove hard-coded dependencies and make components more reusable and testable. Allows for easier testing by injecting dependencies rather than hard-coding them Promotes reusability of components by decoupling them from their dependencies Improves maintainability by making it easier to swap out dependencies without changing the component's code
Add your answer

Q42. How do you create a spring boot application?

Ans.
To create a Spring Boot application, you can use Spring Initializr to generate a project with necessary dependencies and configurations. Go to https://start.spring.io/ Select the project metadata like group, artifact, dependencies, etc. Click on 'Generate' to download the project zip file. Extract the zip file and import the project into your IDE. Start coding your application logic.
Add your answer

Q43. What are starter dependencies in spring boot?

Ans.
Starter dependencies in Spring Boot are pre-configured dependencies that help in quickly setting up a Spring Boot project. Starter dependencies are included in the pom.xml file of a Spring Boot project to provide necessary dependencies for specific functionalities. They help in reducing the manual configuration required to set up a Spring Boot application. Examples of starter dependencies include spring-boot-starter-web for web applications, spring-boot-starter-data-jpa for ...
read more
Add your answer

Q44. What challenges did you face with front end technologies?

Ans.
I faced challenges with front end technologies such as browser compatibility, responsive design, and performance optimization. Browser compatibility issues with different versions of Internet Explorer, Firefox, Chrome, etc. Struggles with creating responsive designs that work well on various screen sizes and devices. Optimizing performance by reducing page load times and improving rendering speed. Dealing with cross-browser inconsistencies in CSS and JavaScript. Implementing...
read more
Add your answer

Q45. Write a Java code and Angular code to retrieve the data from the given URL. "-----/"

Ans.
Retrieve data from a given URL using Java and Angular code. Use Java's HttpURLConnection class to make a GET request to the URL and retrieve the data. In Angular, use HttpClient module to send a GET request to the URL and fetch the data. Parse the retrieved data in both Java and Angular to extract the required information.
Add your answer

Q46. what is difference between abstract and virtual class

Ans.
Abstract class can have abstract methods and cannot be instantiated, while virtual class can be instantiated but can have virtual methods. Abstract class can have abstract methods which must be implemented by the derived classes Virtual class can have virtual methods which can be overridden by the derived classes Abstract class cannot be instantiated directly, while virtual class can be instantiated Abstract class can have non-abstract methods, while virtual class can have a...
read more
Add your answer

Q47. Define Account trigger and What is apex ?

Ans.
Account trigger is a piece of code that executes when a specific event occurs on an account record. Apex is a programming language used to develop Salesforce applications. Account trigger is used to automate processes and perform actions on account records Examples of account triggers include sending an email notification when an account is created or updated Apex is used to write custom business logic and extend the functionality of Salesforce Apex can be used to create cus...
read more
Add your answer

Q48. How to handle error in subflow.

Ans.
Error handling in subflows is crucial for maintaining the flow of the main process. Use error handling nodes like Try/Catch or Error Boundary in the subflow. Log the error message or send it to a monitoring system for further analysis. Consider retrying the subflow or notifying the main process about the error. Implement fallback mechanisms to ensure the main process can continue despite errors.
Add your answer

Q49. What is SLA Based policy, explanation

Ans.
SLA Based policy is a service level agreement that defines the level of service a customer can expect from a provider. SLA Based policy outlines the agreed upon level of service between a service provider and a customer. It includes details such as response time, resolution time, availability, and performance metrics. Failure to meet the SLA can result in penalties or compensation for the customer. For example, an SLA may guarantee a response time of 24 hours for customer su...
read more
Add your answer

Q50. What is difference between prevention and Cure?

Ans.
Prevention focuses on avoiding the occurrence of a problem, while cure involves treating the problem after it has already occurred. Prevention involves taking proactive measures to avoid the occurrence of a problem or disease. Cure involves treating a problem or disease after it has already occurred. Prevention is usually more cost-effective and less invasive than cure. Examples of prevention include vaccinations, regular exercise, and healthy diet choices. Examples of cure ...
read more
Add your answer

Q51. What is tf State file in terraform

Ans.
Terraform state file is a file that keeps track of the resources managed by Terraform in a specific infrastructure. Terraform state file stores metadata about the resources being managed. It helps Terraform understand the current state of the infrastructure and track changes over time. State file is usually stored locally or remotely in a backend like AWS S3 or Terraform Cloud. It should be stored securely to prevent unauthorized access or modifications.
Add your answer

Q52. Difference between constant and read only varaible

Ans.
Constant variables cannot be reassigned while read-only variables can only be assigned once. Constant variables are declared using the 'const' keyword while read-only variables are declared using the 'readonly' keyword. Constant variables are evaluated at compile-time while read-only variables are evaluated at runtime. Constant variables can be declared in methods while read-only variables can only be declared at the class level. Example of constant variable: const int MAX_V...
read more
View 1 answer

Q53. When can we use multiple catch blocks?

Ans.
Multiple catch blocks can be used to handle different types of exceptions in a try-catch block. Multiple catch blocks can be used to handle different types of exceptions separately. Each catch block can specify a different type of exception to catch. The catch blocks are evaluated in order, so the most specific exception types should be caught first. Using multiple catch blocks can make the code more readable and maintainable.
Add your answer

Q54. How can we achieve inheritance in Java?

Ans.
Inheritance in Java allows a class to inherit properties and behaviors from another class. Create a new class using the 'extends' keyword followed by the name of the class you want to inherit from Use super keyword to call the constructor of the parent class Child class can override methods from the parent class
Add your answer

Q55. Solid principles and how they are used in project

Ans.
SOLID principles are design principles used in software development to make software more maintainable, flexible, and scalable. S - Single Responsibility Principle: A class should have only one reason to change. O - Open/Closed Principle: Software entities should be open for extension but closed for modification. L - Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses without affecting the functionality. I - Interface S...
read more
Add your answer

Q56. API Led connectivity explanation in Mulesoft

Ans.
API Led connectivity in Mulesoft is an approach to connecting and exposing APIs in a reusable and scalable manner. API Led connectivity involves organizing APIs into layers based on their functionality such as experience, process, and system APIs. It promotes reusability, flexibility, and scalability by allowing different APIs to be easily connected and reused in various applications. For example, a company may have an API for customer information (system API), which is then...
read more
Add your answer

Q57. How do you habndle Null pointer Exception?

Ans.
Null pointer exceptions can be handled by checking for null values before accessing an object's properties or methods. Always check for null values before accessing object properties or methods Use conditional statements or null checks to prevent null pointer exceptions Handle exceptions using try-catch blocks to gracefully manage errors Avoid chaining method calls on potentially null objects
Add your answer

Q58. What do you know about Agile Methodologies?

Ans.
Agile Methodologies are a set of principles and practices that promote iterative development, collaboration, and flexibility. Agile emphasizes delivering working software frequently, with a focus on customer satisfaction. It values individuals and interactions over processes and tools. Agile promotes responding to change over following a plan. Common Agile frameworks include Scrum, Kanban, and Extreme Programming (XP).
Add your answer

Q59. what is third party drop shipment?

Ans.
Third party drop shipment is a process where a retailer transfers customer orders to a supplier who then ships the product directly to the customer. Retailer does not handle the inventory or shipping of the product Supplier ships the product directly to the customer Retailer earns a commission on the sale Example: Amazon allows third-party sellers to use their platform for drop shipping Example: A small boutique may use a drop shipper to offer a wider range of products witho...
read more
Add your answer

Q60. why you are changing current orginization

Ans.
Seeking new challenges and opportunities for growth. Looking for new challenges and opportunities to learn and grow Interested in expanding my skill set and gaining new experiences Seeking a more supportive and collaborative work environment Want to explore different industries or sectors Desire for career advancement and professional development
Add your answer

Q61. What are mandatory fields in Swift MT 103

Ans.
Mandatory fields in Swift MT 103 message Sender's Reference (20) Sender's Account Number (50K) Receiver's Account Number (59) Amount (32A) Currency (33B) Value Date (32A) Sender's Correspondent (53A) Receiver's Correspondent (54A)
Add your answer

Q62. Difference between SQL data reader and SQL data adapter

Ans.
SQLDataReader reads data in forward-only mode while SQLDataAdapter retrieves data and populates a dataset. SQLDataReader is used for reading data in a forward-only mode. SQLDataAdapter is used for retrieving data and populating a dataset. SQLDataReader is faster and more efficient for reading large amounts of data. SQLDataAdapter is more flexible and can be used to update data as well. SQLDataReader is read-only while SQLDataAdapter can be used for both read and write operat...
read more
Add your answer

Q63. Exception handling, Exception handling design in process.

Ans.
Exception handling is crucial for robust software design. Identify potential exceptions and handle them appropriately Use try-catch blocks to catch exceptions Throw exceptions when necessary Design exception classes to provide meaningful information Consider logging exceptions for debugging purposes
Add your answer

Q64. why are switching very early?

Ans.
I switched very early in my career to explore different opportunities and gain diverse experience. To gain diverse experience and skills To explore different career opportunities To find a better fit for my interests and strengths
Add your answer

Q65. Low level design to build a spring boot app

Ans.
Low level design involves creating detailed technical specifications for building a Spring Boot app. Identify the components and their interactions in the app Define the data model and database schema Design the RESTful APIs and their endpoints Implement security measures such as authentication and authorization Optimize performance by considering caching and asynchronous processing
Add your answer

Q66. Difference between rank dense rank , duplicate removal

Ans.
Rank assigns a unique number to each row based on the order of values. Dense rank assigns a unique number to each row based on the order of values, but skips numbers for ties. Duplicate removal removes duplicate rows from a dataset. Rank assigns a unique number to each row based on the order of values. Dense rank assigns a unique number to each row based on the order of values, but skips numbers for ties. Duplicate removal removes duplicate rows from a dataset. Rank and dens...
read more
Add your answer

Q67. What is AI? Explain with example.

Ans.
AI stands for Artificial Intelligence, which is the simulation of human intelligence processes by machines. AI is a branch of computer science that aims to create intelligent machines that can mimic human behavior. Examples of AI include virtual assistants like Siri and Alexa, self-driving cars, and recommendation systems like those used by Netflix and Amazon. AI algorithms can learn from data, recognize patterns, and make decisions with minimal human intervention. Machine l...
read more
Add your answer

Q68. What is risk? Explain with one example

Ans.
Risk is the potential for loss or harm resulting from a particular action or decision. Risk is inherent in all aspects of life and business It involves uncertainty and the possibility of negative outcomes Examples of risks include financial risk, operational risk, and reputational risk One example is investing in a high-risk stock with the potential for high returns but also the possibility of significant losses
Add your answer

Q69. What are core expertise in oracle fusion?

Ans.
Core expertise in Oracle Fusion includes Oracle Cloud ERP, HCM, SCM, and CX modules. Oracle Cloud ERP - Financials, Procurement, Project Portfolio Management Oracle Cloud HCM - Core HR, Talent Management, Payroll Oracle Cloud SCM - Inventory Management, Order Management, Supply Chain Planning Oracle Cloud CX - Sales, Marketing, Service
Add your answer

Q70. Difference between waterfall and agile methodologies

Ans.
Waterfall is a linear sequential approach to software development, while Agile is an iterative and incremental approach. Waterfall follows a sequential process, while Agile allows for flexibility and adaptability. Waterfall requires all requirements to be defined upfront, while Agile allows for changes throughout the project. Waterfall has a fixed timeline and budget, while Agile focuses on delivering value in short iterations. Waterfall is more suitable for projects with we...
read more
Add your answer

Q71. What do you know about new keyword in c#

Ans.
The 'new' keyword in C# is used to create an instance of a class or to hide a base class member. Used to create an instance of a class Used to hide a base class member Can be used with constructors, methods, properties, and events Example: MyClass obj = new MyClass(); Example: public new void MyMethod() { }
Add your answer

Q72. For Each Loop vs Batch processing diff

Ans.
For Each Loop processes elements one by one, while Batch processing groups elements together for processing. For Each Loop is used to iterate over each element in a collection individually. Batch processing involves processing a group of elements together in a single operation. For Each Loop is more suitable for small collections, while Batch processing is efficient for large datasets. Example: For Each Loop can be used to iterate over each item in a list, while Batch proces...
read more
Add your answer

Q73. What are the different type of extractors?

Ans.
Different types of extractors include mechanical extractors, chemical extractors, and biological extractors. Mechanical extractors use physical force to extract substances from a mixture, such as pressing or grinding. Chemical extractors use solvents or other chemicals to separate desired compounds from a mixture. Biological extractors use living organisms or enzymes to extract specific compounds from a mixture. Examples include juicers as mechanical extractors, solvent extr...
read more
Add your answer

Q74. can we create an object of a constructor

Ans.
No, we cannot create an object of a constructor directly. Constructors are used to initialize objects of a class, not to create objects of the constructor itself. To create an object, we use the 'new' keyword followed by the constructor function. Example: function Person(name) { this.name = name; } var person1 = new Person('John');
Add your answer

Q75. sql joins and what is the deault join

Ans.
SQL joins are used to combine rows from two or more tables based on a related column between them. The default join is an INNER JOIN. SQL joins are used to retrieve data from multiple tables based on a related column between them The default join in SQL is an INNER JOIN, which returns rows when there is at least one match in both tables Other types of joins include LEFT JOIN, RIGHT JOIN, and FULL JOIN
Add your answer

Q76. What do you mean by bind variables in salesforce

Ans.
Bind variables in Salesforce are placeholders used in SOQL queries to improve performance and prevent SQL injection. Bind variables are denoted by a colon followed by a variable name in a SOQL query. They are used to pass dynamic values into a query at runtime. Bind variables improve query performance by allowing Salesforce to reuse the query plan. They also prevent SQL injection attacks by automatically escaping special characters. Example: SELECT Id, Name FROM Account WHER...
read more
Add your answer

Q77. Why interface is being used in c#

Ans.
Interfaces are used in C# to define a contract that a class must implement. Interfaces allow for polymorphism and abstraction They provide a way to achieve loose coupling between classes Interfaces can be used to define common behavior across multiple classes Example: IDisposable interface is used to ensure that objects are properly disposed of when they are no longer needed
Add your answer

Q78. Have you work on agile environment

Ans.
Yes, I have worked on agile environment. I have experience working in Scrum and Kanban methodologies. I have participated in daily stand-up meetings, sprint planning, and retrospectives. I have worked closely with product owners and stakeholders to prioritize and deliver features. I have used tools such as Jira and Trello to manage tasks and track progress. I have also been involved in continuous improvement initiatives to optimize team performance.
Add your answer

Q79. What is Salesforce? What is multitenacy?

Ans.
Salesforce is a cloud-based CRM platform that allows businesses to manage customer interactions and data. Salesforce provides a range of tools and features for sales, marketing, customer service, and analytics. It allows businesses to store and manage customer data in a centralized location. Salesforce is a multitenant platform, which means that multiple businesses can use the same instance of the software while keeping their data separate and secure. Multitenancy allows for...
read more
Add your answer

Q80. Difference between abstract and interface class

Ans.
Abstract class is a class that cannot be instantiated, while interface is a contract that defines the behavior of a class. Abstract class can have both abstract and non-abstract methods, while interface can only have abstract methods. A class can implement multiple interfaces, but can only inherit from one abstract class. Abstract class can have constructors, while interface cannot. Example of abstract class: Animal (abstract method: makeSound()) Example of interface: Runnab...
read more
Add your answer

Q81. What is load balancer

Ans.
A load balancer is a device or software that distributes network or application traffic across multiple servers to ensure optimal resource utilization, reliability, and performance. Balances incoming network or application traffic across multiple servers Improves reliability by distributing workload evenly Enhances performance by preventing any single server from becoming a bottleneck Can be hardware-based or software-based Examples include F5 BIG-IP, Citrix NetScaler, and N...
read more
Add your answer

Q82. What is step function

Ans.
A step function is a mathematical function that changes abruptly from one constant value to another. Step functions are often used in computer science and signal processing to model discrete changes in a system. Examples include the Heaviside step function and the rectangular function. Step functions are characterized by having a constant value within specific intervals and sudden jumps at the boundaries.
Add your answer

Q83. What is relative path and absoulute path

Ans.
Relative path is a path that is relative to the current working directory, while absolute path is a full path starting from the root directory. Relative path does not start with the root directory, but rather with the current working directory. Absolute path starts from the root directory and includes all directories leading to the desired file or folder. Example of relative path: 'folder/file.txt' Example of absolute path: '/home/user/folder/file.txt'
Add your answer

Q84. How to call apex class from flow

Ans.
You can call an Apex class from a flow by using the 'InvocableMethod' annotation in the Apex class. Create an Apex class with a method annotated with @InvocableMethod. Add input and output parameters to the method. Use the 'Flow' element in the flow builder to call the Apex class and pass input parameters. Handle the output from the Apex class in the flow.
Add your answer

Q85. Explain any special procurement process in detail.

Ans.
Special procurement process involves unique steps or requirements for purchasing goods or services. Special procurement process may involve additional approvals or documentation It may require specific vendors or suppliers to be used Examples include government procurement processes or procurement for highly regulated industries such as pharmaceuticals May also involve bidding or negotiation processes
Add your answer

Q86. how does s3 lifecycle management works?

Ans.
S3 lifecycle management automates the process of moving objects between different storage classes in S3 based on predefined rules. Lifecycle policies can transition objects to different storage classes like S3 Standard, S3 Intelligent-Tiering, S3 Standard-IA, and S3 One Zone-IA. Objects can also be archived to Glacier or Glacier Deep Archive for cost optimization. Rules can be based on object age, size, or custom metadata. Lifecycle policies can help in reducing storage cost...
read more
Add your answer

Q87. What is a B-tree index?

Ans.
A B-tree index is a data structure used in databases to efficiently store and retrieve data in sorted order. B-tree indexes are commonly used in database management systems to speed up data retrieval operations. They are balanced tree data structures that allow for efficient insertion, deletion, and search operations. B-tree indexes are particularly useful for range queries and sequential access. Example: In a database table with a B-tree index on the 'last_name' column, sea...
read more
Add your answer

Q88. What are ACID properties?

Ans.
ACID properties are a set of properties that guarantee the reliability of database transactions. ACID stands for Atomicity, Consistency, Isolation, and Durability. Atomicity ensures that either all operations in a transaction are completed successfully or none are. Consistency ensures that the database remains in a consistent state before and after the transaction. Isolation ensures that the concurrent execution of transactions does not interfere with each other. Durability ...
read more
Add your answer

Q89. What is normalization?

Ans.
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity. Normalization involves breaking down data into smaller, more manageable tables It helps in reducing data redundancy by eliminating duplicate data Normalization ensures data integrity by enforcing relationships between tables There are different levels of normalization such as 1NF, 2NF, 3NF, and BCNF
Add your answer

Q90. Difference between serial and cover method

Ans.
Serial method involves testing one sample at a time, while cover method involves testing multiple samples together. Serial method tests samples individually in sequence Cover method tests multiple samples simultaneously Serial method is time-consuming but more accurate Cover method is faster but may lead to false negatives Example: Serial method used in PCR testing, cover method used in pool testing
Add your answer

Q91. what is pricing procedure?

Ans.
Pricing procedure is a set of rules and conditions used to determine the price of a product or service. Pricing procedure is used in SAP to determine the price of a product or service It consists of various condition types such as discounts, taxes, surcharges, etc. Each condition type has its own set of rules and conditions that determine its value The pricing procedure is determined based on the sales area, customer, and material Examples of condition types include PR00 (ba...
read more
View 1 answer

Q92. What is Batch class and example

Ans.
Batch class is a Salesforce feature used to process large amounts of data in chunks. Batch class implements the Database.Batchable interface in Salesforce It allows you to break down a large data set into smaller batches for processing Batch class is useful for handling large data volumes without hitting governor limits Example: A batch class can be used to update all account records with a specific field value
Add your answer

Q93. Explain diffrence between comparable and comparator

Ans.
Comparable refers to a similar item or product, while comparator is a tool used to compare two or more items. Comparable refers to a product or item that is similar in nature to another product or item. Comparator is a tool used to compare two or more products or items based on certain criteria. Comparable is used to determine the value of a product or item based on its similarity to other products or items. Comparator is used to determine the differences between two or more...
read more
Add your answer

Q94. How do we make and ALV field editable?

Ans.
To make an ALV field editable, set the field catalog attribute 'edit' to 'X'. Set the 'edit' attribute of the field catalog to 'X' Use the method 'set_table_for_first_display' to display the ALV grid with editable fields
Add your answer

Q95. What is Web API and REST API?

Ans.
Web API and REST API are communication protocols used for accessing and exchanging data over the internet. Web API stands for Web Application Programming Interface, which allows communication between different software applications over the web. REST API stands for Representational State Transfer, which is an architectural style for designing networked applications. Web APIs can use various protocols like HTTP, SOAP, or XML-RPC for communication. REST APIs use standard HTTP ...
read more
Add your answer

Q96. Difference between sales cloud and service cloud

Ans.
Sales cloud is focused on managing sales processes and customer relationships, while service cloud is focused on providing customer support and service. Sales cloud is used for managing sales leads, opportunities, and forecasting. Service cloud is used for managing customer support cases, knowledge base, and service contracts. Sales cloud helps sales teams track their interactions with customers and close deals efficiently. Service cloud helps customer service teams provide ...
read more
Add your answer

Q97. Different between profile and permission set

Ans.
Profiles define the baseline permissions and settings for a user, while permission sets provide additional permissions to users. Profiles are assigned to users to determine their baseline permissions and settings. Permission sets are used to grant additional permissions to users without changing their profile. Profiles control access to objects, fields, and records, while permission sets grant access to specific features or functions. Profiles are mandatory for every user, w...
read more
Add your answer

Q98. What are the different port numbers used

Ans.
Port numbers are used to identify specific services or processes running on a computer network. Port 80 is commonly used for HTTP traffic Port 443 is commonly used for HTTPS traffic Port 22 is commonly used for SSH connections Port 25 is commonly used for SMTP email traffic Port 21 is commonly used for FTP connections
Add your answer

Q99. Difference between centralised & decentralised EAM

Ans.
Centralised EAM involves a single central authority making decisions, while decentralised EAM allows for decision-making at various levels. Centralised EAM has a top-down approach with decisions made by a central authority. Decentralised EAM allows for decision-making at different levels within the organization. Centralised EAM can lead to quicker decision-making but may lack flexibility. Decentralised EAM can promote innovation and adaptability but may result in inconsisten...
read more
Add your answer

Q100. What are type of master data.

Ans.
Master data refers to the key data entities that are critical to the business operations of an organization. Customer data Product data Vendor data Employee data Financial data Material data Asset data Location data
Add your answer
1
2
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos
Share Interview Advice
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2023 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter