Wipro
2500+ Interview Questions and Answers
Print the following pattern for the given N number of rows.
Pattern for N = 4
* ** *** ****
Note : There are no spaces between the stars (*).
Input format :
Integer N (Total no. of rows)
...read moreYou are given a string āSā of length āNā. The string can be encoded using the following rules:
1) If the āi-thā character is a vowel, change it to the next character in the alphabetical sequenc...read more
There is a potter who makes pottery wares. With his saving, he can purchase some pottery clay, say āKā units to make pottery wares. He can transform this clay into āNā different items. Each item requir...read more
You have been given two strings A and B consisting of lower case English letters. The task is to count the minimum number of pre-processing moves on the string A require...read more
You have been given a random integer array/list(ARR) of size N, and an integer X. You need to search for the integer X in the given array/list using 'Linear Search'.
You have been required to retu...read more
You are given two numbers 'A' and 'B' in the form of two arrays (A[] and B[]) of lengths 'N' and 'M' respectively, where each array element represents a digit. You need to find the sum of these...read more
Given an array with N elements, the task is to reverse all the array elements and print the reversed array.
Input Format:
The first line contains an integer N representing the size of the array...read more
You have been given two integers āNā and āKā. Your task is to find the K-th permutation sequence of numbers from 1 to āNā. The K-th permutation is the K-th permutation in the set of all...read more
You are given an array āARRā of size N. You have to construct a Product Array āPā of the same size such that P[i] is equal to the product of all the elements of ARR except ARR[i]. The constra...read more
Given an array/list of integer numbers 'CHOCOLATES' of size 'N', where each value of the array/list represents the number of chocolates in the packet. There are āMā number of students and the t...read more
Ninja has been given a string 'STR' containing only lowercase alphabetic characters. Ninja has to find the number of all the different possible substrings of size two that appear in 'STR' as...read more
You are given the list of costs of pants in an array āpantsā, shirts in an array āshirtsā, shoes in an array āshoesā, and skirts in an array āskirtsā. You are also given a budget amount āXā to s...read more
Given an array of non-negative integers āAā and an integer āPā, find the total number of subsequences of āAā such that the product of any subsequence should not be more than āPā.
A s...read more
Given a sequence of numbers āARRā. Your task is to return a sorted sequence of āARRā in non-descending order with help of the merge sort algorithm.
Example :
Merge Sort Algorithm - Merge sort is a Div...read more
You are given an array 'ARR' of 'N' positive integers. You need to find the minimum number of operations needed to make all elements of the array equal. You can perform addition, multiplicatio...read more
The minimum number of operations needed to make all elements of the array equal by performing addition, multiplication, subtraction, or division on any element.
Iterate through the array and find the maximum and minimum values
Calculate the difference between the maximum and minimum values
Check if the difference is divisible by the length of the array
If divisible, return the difference divided by the length
If not divisible, return the difference divided by the length plus one
You are given a bag of size 'W' kg and provided with the costs of packets with different weights of oranges as a list/array with the name 'cost'. Every i-th position in the cost denot...read more
Q17. Difference between compiler and interpreter. Why do you apply to IT, from your respective branch?
Compiler translates entire code into machine language while interpreter translates line by line.
Compiler generates an executable file while interpreter does not.
Compiler takes more time to analyze and translate the code while interpreter takes less time.
Compiler produces faster and efficient code while interpreter produces slower code.
Examples of compilers are GCC, Clang, and Visual C++ while examples of interpreters are Python, Ruby, and JavaScript.
Q18. 2. What is Cloud Technology. What is Microsoft Intune. If we can manage applications using MAM then why do we need MDM?
Cloud technology is the delivery of computing services over the internet. Microsoft Intune is a cloud-based mobile device management (MDM) and mobile application management (MAM) solution.
Cloud technology allows users to access data and applications from anywhere with an internet connection.
Microsoft Intune is a cloud-based solution that allows organizations to manage mobile devices and applications.
MAM allows organizations to manage and secure applications and data on mobile...read more
Bubble Sort is one of the sorting algorithms that works by repeatedly swapping the adjacent elements of the array if they are not in sorted order.
You are given an unsorted array consisting of N non-...read more
Hatori is the class teacher with 'N' students. He wants to select some students for the Republic Day parade. But out of all the students he chooses, the absolute difference of heights of any ...read more
You have been given a string STR. Your task is to find the total number of palindromic substrings of STR.
Example :
If the input string is "abbc", then all the possible palindromic substr...read more
You are given a positive integer 'N'. Your task is to return all the prime numbers less than or equal to the 'N'.
Note:
1) A prime number is a number that has only two factors: 1 and the number...read more
Given a binary number as an integer N, convert it into decimal and print.
Input format :
An integer N in the Binary Format
Output format :
Corresponding Decimal number (as integer)
Constraint...read more
Q24. Whatās your experience with content management systems/design software/web publishing software?
I have extensive experience with various content management systems and design software.
Proficient in Adobe Creative Suite, including Photoshop, Illustrator, and InDesign
Experience with WordPress, Drupal, and Joomla CMS platforms
Familiarity with HTML, CSS, and JavaScript
Ability to create and manage content for websites and social media platforms
Experience with user experience (UX) design and testing
Euclid, Pythagoras, Pascal and Monte plan to play in a park. Pascal, Monte and Euclid enter the park first and stand at three different arbitrary positions. As Pythagoras is the ...read more
You are given an array consisting of N integers. You need to find the number of k-element subsequences of the given array where the bitwise AND of the subsequence's elements is maximal. ...read more
The task is to find the maximal AND value and the number of subsequences having this maximal AND value.
Iterate through all possible k-element subsequences of the given array
Calculate the bitwise AND of each subsequence
Track the maximal AND value and the count of subsequences with this value
Return the maximal AND value and the count modulo 1000000007
Q27. What automation framework have you worked on?
I have worked on multiple automation frameworks including Selenium, Appium, and TestNG.
I have experience in creating and maintaining automated test scripts using Selenium WebDriver for web applications.
I have also worked with Appium for mobile automation testing.
TestNG has been my preferred choice for test management and reporting.
I have also integrated automation scripts with CI/CD pipelines using tools like Jenkins.
I have experience in creating custom frameworks using Java ...read more
Q28. 1. OOPs concept 2. Difference between Encapsulation and Abstraction? 3. What is an array? How it's different from Array list? 4. Explain about the data structures you have used? 5. What is foreign key?
Interview questions for Project Engineer position
OOPs concept includes inheritance, polymorphism, encapsulation, and abstraction
Encapsulation is hiding the implementation details while abstraction is hiding unnecessary details
Array is a collection of similar data types while ArrayList is a dynamic array that can grow or shrink
Data structures used may include linked lists, stacks, queues, and trees
Foreign key is a column in a table that refers to the primary key of another tab...read more
You have been given a binary tree of 'N' unique nodes and a Start node from where the tree will start to burn. Given that the Start node will always exist in the tree, your task is to print the...read more
You have been given two Strings āSTR1ā and āSTR2ā of characters. Your task is to find the length of the longest common subsequence.
A String āaā is a subsequence of a String ābā if āa...read more
There is a wedding ceremony at NinjaLand. The bride and groom want everybody to play a game and thus, they have blindfolded the attendees. The people from the brideās side are holding odd numb...read more
Q32. Why did you choose this programming language over other programming languages?
I chose this programming language because of its versatility and popularity in the industry.
The language has a wide range of applications and can be used for various purposes.
It has a large community of developers who contribute to its development and provide support.
The language is constantly evolving and adapting to new technologies and trends.
Examples of its popularity and versatility can be seen in its use in web development, data analysis, and machine learning.
Print the following pattern
Pattern for N = 4
The dots represent spaces.
Input Format:
The first line contains a single integer āTā representing the number of test cases. The first line of each tes...read more
Q34. Which is the most comfortable Windows OS for you to work on? ...What is the use of DHCP? ...What is the basic use of DNS at workstations? ...What do you understand by a Default Gateway? ...How can we track the ...
read moreThe most comfortable Windows OS for me to work on is Windows 10.
Windows 10 is user-friendly and has a familiar interface.
It offers improved security features compared to previous versions.
Windows 10 provides regular updates and compatibility with modern software.
It has a wide range of hardware and software support.
Windows 10 includes useful features like Cortana and virtual desktops.
You have been given an integer array/list 'ARR' of size 'N'. Your task is to return the total number of those subsequences of the array in which all the elements are equal.
A subsequence of a ...read more
You have been given an integer array/list 'ARR' of size 'N'. Your task is to return the total number of those subsequences of the array in which all the elements are equal.
A subsequence of a g...read more
Q37. What's IP address and why is it required?
An IP address is a unique numerical identifier assigned to devices connected to a network to enable communication.
IP stands for Internet Protocol
It is required for devices to communicate with each other over a network
It consists of a series of numbers separated by dots
There are two types of IP addresses - IPv4 and IPv6
Examples of IP addresses are 192.168.0.1 and 2001:0db8:85a3:0000:0000:8a2e:0370:7334
Q38. What is Stp and how it is work? What is root bridge
STP (Spanning Tree Protocol) is a network protocol that prevents loops in Ethernet networks. It elects a root bridge to manage the network.
STP is a network protocol used to prevent loops in Ethernet networks.
It works by creating a loop-free logical topology by blocking redundant paths.
STP elects a root bridge, which becomes the central point of the network.
The root bridge is the bridge with the lowest bridge ID.
STP uses Bridge Protocol Data Units (BPDUs) to exchange informati...read more
Given an array 'arr' of 'N' integers and an integer 'K'. The array 'arr' may contain duplicate integers. Return "true" if the array contains any duplicate element within the 'K' distance from eac...read more
Problems were from Number System
HCF and LCM
Divisibility Rules
Power Cycle and Remainder Cycle
Fractions
* Time and Work
Working with different & same efficiencies
Pipes and Cisterns
* Time Speed and Dist...read more
Q41. What is constarints, what is commit command in sql, write syntax of join operation and one programming question write a code for reverse an array
Answering technical interview questions on SQL and programming
Constraints are rules applied to columns in a database table to ensure data integrity
COMMIT command is used to save changes made to a database
JOIN operation is used to combine rows from two or more tables based on a related column
Code for reversing an array: reverseArray(arr) {return arr.reverse();}
Q42. How do you capture a clientās voice?
Capturing a client's voice involves active listening, empathy, and understanding their needs and preferences.
Listen actively to their feedback and concerns
Ask open-ended questions to encourage them to share their thoughts
Empathize with their perspective and show that you understand their needs
Use their language and tone in your communication
Take note of their preferences and incorporate them into your strategy
Collect data through surveys, focus groups, and social media monito...read more
Ninja has been given two sorted integer arrays/lists āARR1ā and āARR2ā of size āMā and āNā. Ninja has to merge these sorted arrays/lists into āARR1ā as one sorted array. You may have to a...read more
You are given an array 'ARR' of the 'N' element. Your task is to find the maximum difference between any of the two elements from 'ARR'.
If the maximum difference is even print āEVENā without ...read more
You are given a binary tree. Your task is to return the count of the diagonal paths to the leaf of the given binary tree such that all the values of the nodes on the diagonal are equal.
Note...read more
1. Given a School/College, how to distribute the data between different groups , their types and what should be used loops , conditions, etc in detail.
2. What is Inheritance, Polymorphism?
3. Give ...read more
Given an integer āNā representing the number of pairs of parentheses, Find all the possible combinations of balanced parentheses with the given number of pairs of parentheses.
Note :
Conditi...read more
You are given a string, āSā. You need to reverse the string where characters that are not an alphabet stay in the same place, and the rest reverse their positions.
Eg: āa-bcdā becomes ād-cba...read more
An alien spaceship arrived at our planet Earth. An alien dropped his dictionary of words on the way back to his planet. Ninja found that dictionary and now wants to create the order of the charac...read more
Ninja loves playing with numbers. One day Alice gives him some numbers and asks him to find the Kth largest value among them.
Input Format:
The first line of input contains an integer āT,ā de...read more
Remove all leaf nodes from a given generic Tree. Leaf nodes are those nodes, which don't have any children.
Note : Root will also be a leaf node if it doesn't have any child. You don't ...read more
You are given an array āAā of size āNā. Return true if an array can be divided into groups of pairs such that XOR of each pair is equal to 0.
A pair consists of two integers.
Example : Let the array be { 1, ...read more
You are given the first term (A), the common ratio (R) and an integer N. Your task is to find the Nth term of the GP series.
The general form of a GP(Geometric Progression) series is A, A(R), A(R^...read more
Q54. How do you prioritize projects?
Prioritizing projects involves assessing their importance, urgency, and impact on business goals.
Identify the goals and objectives of the company
Assess the importance and urgency of each project
Consider the impact of each project on business goals
Allocate resources based on priority
Regularly review and adjust priorities as needed
Q55. Write a program to remove duplicate character in a string if there are multiple users in an application, and if the buttons in the applications are specific to particular user, you need to perform operation in ...
read moreQuestions related to Selenium Automation and software testing
To remove duplicate characters in a string, use a loop and a hashset
To perform operations on specific buttons for a user, use conditional statements
To switch to a particular tab, use the window handle
500 error code in Postman validation indicates a bad request
Primary key is a unique identifier for a record in a database
Roles and responsibilities in a project depend on the project and team
Q56. How to calculate timing of Incident which assigned to multiple group
To calculate the timing of an incident assigned to multiple groups, determine the start and end times for each group and calculate the total duration.
Identify the groups to which the incident is assigned
Determine the start time and end time for each group's involvement
Calculate the duration for each group
Sum up the durations to get the total timing of the incident
Q57. 7.A user has received a zip file in Outlook, which is a managed app. Will the user be able to open that zip file?
It depends on the app's settings and the user's permissions.
If the managed app allows opening zip files and the user has permission to do so, then they can open it.
If the app does not allow opening zip files or the user does not have permission, then they cannot open it.
The user should check with their IT department or the app's documentation to determine if zip files are allowed.
If the zip file contains a potentially harmful file type, the app may block it from being opened.
Q58. 1 introduction 2 what is the features of Java 3 what are the differences between C++ and Java 4 OOP concepts including oops pullers 5 why Java is not 100% object oriented programming 6 why Java is platform inde...
read moreAbout and why Wipro were the major questions asked to me. They also asked me about my key learnings from my internships.
Finally the interview ended with if I was comfortable with contract an...read more
Q60. What are the different kinds of inheritance?
There are 5 types of inheritance in object-oriented programming.
Single inheritance: a subclass inherits from a single superclass.
Multiple inheritance: a subclass inherits from multiple superclasses.
Multilevel inheritance: a subclass inherits from a superclass, which in turn inherits from another superclass.
Hierarchical Inheritance: multiple subclasses inherit from a single superclass.
Hybrid inheritance: a combination of multiple and multilevel inheritance.
Given a string, determine if it is a palindrome, considering only alphanumeric characters.
Palindrome
A palindrome is a word, number, phrase, or other sequences of characters which read the sam...read more
Q62. How many Google maping .. types are there ..
There are several types of Google mapping, including Google Maps, Google Earth, and Google Street View.
Google Maps is a web-based mapping service that provides directions, traffic information, and satellite imagery.
Google Earth is a virtual globe that allows users to explore the Earth's surface using satellite imagery and aerial photography.
Google Street View provides panoramic views of streets and locations using 360-degree street-level imagery.
Other types of Google mapping ...read more
Q63. What is main difference between recursion and dynamic programming and which is better in terms of time complexity?
Recursion is a technique of solving a problem by breaking it down into smaller subproblems. Dynamic programming is a method of solving a problem by breaking it down into smaller subproblems and storing the solutions to those subproblems to avoid redundant calculations.
Recursion involves solving a problem by breaking it down into smaller subproblems and calling the function recursively until the base case is reached.
Dynamic programming involves solving a problem by breaking it...read more
What is RAID structure in OS? What are the different levels of RAID configuration?
Q65. How to rectify data recovery, dual monitor connection
To rectify data recovery, dual monitor connection, check cables, update drivers, and use data recovery software.
Check cables and connections for dual monitor setup
Update drivers for graphics card and monitor
Use data recovery software to recover lost data
Ensure proper backup procedures are in place to prevent data loss
Q66. The ages of Raj and Sakshi are in the ratio of 8:7 and on adding their ages we get 60. Determine the ratio of their ages after 6 years.
Ratio of ages of Raj and Sakshi is 8:7 and their sum is 60. Find their ratio after 6 years.
Let the ages of Raj and Sakshi be 8x and 7x respectively
Their sum is 60, so 15x = 60
Hence, x = 4
After 6 years, Raj's age will be 8x+6 and Sakshi's age will be 7x+6
The ratio of their ages after 6 years will be (8x+6):(7x+6)
Q67. How to make a thread safe object in Java?
To make a thread safe object in Java, use synchronization or locks.
Use synchronized keyword to ensure only one thread can access the object at a time.
Use locks to provide more fine-grained control over synchronization.
Use thread-safe data structures like ConcurrentHashMap or AtomicInteger.
Avoid using static variables or mutable shared state.
Consider using immutable objects or thread-local variables.
Test the thread safety of your code using tools like JUnit or stress testing.
D...read more
Q68. What is the relation between Incident and change?
Incidents can trigger changes to prevent future incidents.
Incidents can reveal weaknesses in the system that require changes to prevent future incidents.
Changes can also cause incidents if not properly managed.
Incident and change management processes should be closely integrated.
For example, a major incident caused by a software bug may require a change to the code to prevent it from happening again.
Similarly, a change to a server configuration may cause an incident if not pr...read more
Q69. What is DDOS Attack and what you will use to prevent it.
DDOS attack is a malicious attempt to disrupt normal traffic of a targeted server or network by overwhelming it with a flood of internet traffic.
DDOS stands for Distributed Denial of Service
Attackers use multiple devices to send a huge amount of traffic to the target server or network
It can cause the server or network to crash or become unavailable to legitimate users
Prevention measures include using firewalls, load balancers, and DDOS mitigation services
Q70. What do u know about printer...? How many types of printer are there?
Printers are output devices that produce hard copy output from computers. There are several types of printers.
Types of printers include inkjet, laser, thermal, and dot matrix.
Inkjet printers use liquid ink sprayed through microscopic nozzles onto paper.
Laser printers use toner powder and heat to fuse the toner onto paper.
Thermal printers use heat to transfer ink onto paper.
Dot matrix printers use a print head that strikes an ink ribbon to create dots on paper.
Printers can als...read more
Q71. What is the difference between encapsulation and polymorphism?
Encapsulation is hiding implementation details while polymorphism is using a single interface for multiple types.
Encapsulation is achieved through access modifiers like private, protected, and public.
Polymorphism allows objects of different classes to be treated as if they are of the same class.
Encapsulation is about data hiding and abstraction while polymorphism is about behavior.
Example of encapsulation: a class with private variables and public methods to access them.
Examp...read more
Q72. What are firewalls and application gateways and the difference between them?
Firewalls and application gateways are both security measures used to protect networks, but they differ in their approach.
Firewalls are network security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules.
Application gateways, also known as application-level gateways or application layer firewalls, operate at the application layer of the OSI model and can inspect and filter traffic based on the specific application bein...read more
Q73. Program to check if two given matrices are identical
Program to check if two given matrices are identical
Check if the dimensions of both matrices are same
Iterate through each element of both matrices and compare them
If all elements are same, matrices are identical
Strength and weakness
What keeps you motivated?
Q75. If you have learn anew programing language for this job,what wil do ?
I would take the initiative to learn the new programming language as quickly as possible.
Research the best resources for learning the language
Practice coding in the new language regularly
Seek guidance and mentorship from experienced programmers
Attend workshops and conferences to enhance knowledge
Apply the new language in real-world projects to gain experience
Q76. Tell me some keywords to make a thread safe program in java ?
Keywords for thread safe program in Java
Synchronization using synchronized keyword
Using volatile keyword for shared variables
Using atomic classes for thread safe operations
Using thread safe collections like ConcurrentHashMap
Using locks and semaphores for synchronization
Avoiding shared mutable state
Using immutable objects
Using thread local variables
Q77. What are the kinds of data stored by MS Excel?
MS Excel can store various types of data including numbers, text, dates, and formulas.
Numeric data such as sales figures, budgets, and inventory levels
Text data such as customer names, product descriptions, and employee information
Date and time data such as order dates, delivery dates, and project deadlines
Formulas and functions for calculations and data analysis
Charts and graphs for visual representation of data
Q78. Which programming language are you comfortable with?
I am comfortable with multiple programming languages including Java, Python, and C++.
Proficient in Java, Python, and C++
Experience with web development languages such as HTML, CSS, and JavaScript
Familiarity with database languages such as SQL
Comfortable with object-oriented programming and software development principles
Q79. ALM process? Suppose there is only dev and prod environment how we can create test environment for tester?
To create a test environment for testers in a dev and prod setup, we can follow the ALM process.
Create a separate branch from the dev environment codebase for testing purposes
Deploy the branch to a separate environment for testing
Once testing is complete, merge the branch back into the dev environment
Deploy the updated dev environment to the prod environment
Ensure proper version control and documentation throughout the process
Q80. What are AL/ML and their differences?
AL/ML are Artificial Intelligence and Machine Learning respectively. AL is a broader term while ML is a subset of AL.
AL involves creating intelligent machines that can perform tasks without human intervention
ML is a subset of AL that involves training machines to learn from data and improve their performance
AL includes various techniques such as rule-based systems, expert systems, and natural language processing
ML includes techniques such as supervised learning, unsupervised ...read more
Q81. Explain your project? What are DDL commands in sql? difference between c++ and java? What is Primary and foreign key? Joins in sql explain types of joins?
Answering questions related to project, SQL commands, and programming languages.
Project involved developing a web application using Java and MySQL database.
DDL commands in SQL are used to define the structure of a database.
C++ is a compiled language while Java is an interpreted language.
Primary key uniquely identifies a record while foreign key establishes a relationship between two tables.
Joins in SQL are used to combine data from two or more tables based on a related column...read more
Q82. 1. Why I choose Transition Management 2. Explain RFP/RFI process in detail. 3. How to calculate exact Transition duration while solutioning. 4. How to conclude with FTE count. 5. What are general problems faced...
read moreTransition Manager interview questions on choosing transition management, RFP/RFI process, transition duration calculation, FTE count, and general problems faced during execution.
I chose Transition Management because of my interest in managing change and ensuring smooth transitions.
RFP/RFI process involves creating a request for proposal or information to solicit bids from vendors, evaluating the responses, and selecting the best fit.
Transition duration can be calculated by c...read more
Q83. What is GPS in mapping and what is pinpoint
GPS in mapping is a technology that uses satellites to determine location. Pinpoint is the exact location on a map.
GPS stands for Global Positioning System and uses satellites to determine location
Pinpoint is the exact location on a map, often marked with a pin or marker
GPS in mapping allows for accurate navigation and location tracking
Examples of GPS mapping applications include Google Maps and Waze
Q84. What is zonning .And have you ever been part of upgradation ?
Zoning is a method of dividing a storage area network (SAN) into smaller, isolated sections to improve performance and security.
Zoning is used to control access to specific resources within a SAN.
It can be done at the port level, device level, or WWN level.
Zoning can be hard or soft, depending on whether it is enforced by hardware or software.
Upgrading a SAN may require changes to zoning configurations to accommodate new hardware or software.
I have been part of SAN upgrades t...read more
Q85. How do you pull some specific data from a table based on given conditions ?
To pull specific data from a table based on given conditions, use SQL SELECT statement with WHERE clause.
Identify the table and columns containing the data
Specify the conditions using operators such as =, >, <, LIKE, etc.
Use SELECT statement with WHERE clause to retrieve the data
Example: SELECT * FROM table_name WHERE column_name = 'condition'
Use AND or OR operators to combine multiple conditions
Q86. ...What do you understand by a Default Gateway? ...How can we track the path of the packet going to its destination?
Default Gateway is the IP address of the router that connects a device to other networks. We can track packet path using Traceroute.
Default Gateway is the first point of contact for a device when it tries to connect to other networks.
It acts as a mediator between the device and other networks.
It helps in routing the traffic to the correct destination.
Traceroute is a tool that can be used to track the path of a packet going to its destination.
It works by sending packets with i...read more
Q87. What exactly is NLP? Explain for a layman
NLP stands for Natural Language Processing. It is a field of study that focuses on making computers understand human language.
NLP involves teaching computers to understand and interpret human language, both written and spoken.
It is used in various applications such as chatbots, virtual assistants, and language translation software.
NLP uses techniques such as sentiment analysis, named entity recognition, and part-of-speech tagging to analyze and understand language.
Examples of...read more
Q88. Are all inheritance applicable in Python?
No, not all inheritance is applicable in Python.
Python supports single inheritance, where a class can inherit from only one parent class.
Multiple inheritance is also possible, but it can lead to the diamond problem.
Python also supports multilevel inheritance, where a class can inherit from a parent class, which in turn can inherit from another parent class.
Inheritance can be used to reuse code and create a hierarchy of classes.
Example: class B inherits from class A - class B(...read more
Q89. Are you ready to sign the service bonds?
Yes, I am willing to sign the service bonds.
I understand the importance of service bonds in ensuring job security and commitment to the company.
I am confident in my abilities to fulfill the responsibilities of the Project Engineer role and am committed to staying with the company for the duration of the bond.
I am open to discussing the terms and conditions of the bond before signing.
Q90. What is mortgage value
Mortgage value refers to the monetary worth of a property that is used as collateral for a loan.
Mortgage value is the assessed value of a property that determines the maximum loan amount a borrower can obtain.
It is based on factors such as the property's location, size, condition, and market trends.
Lenders typically lend a percentage of the mortgage value, known as loan-to-value ratio.
For example, if a property's mortgage value is $200,000 and the lender offers an 80% loan-to...read more
Share your screen and write demo code based on Dynamic memory allocation.
Q92. Which programming language do you refer,
I prefer Python for its simplicity and versatility.
Python is easy to learn and has a large community for support.
It can be used for a variety of tasks such as web development, data analysis, and automation.
Python also has many libraries and frameworks available for use.
Other languages I am familiar with include Java and C++.
Q93. 3.What is the difference between Passcode and PIN?
Passcode and PIN are both used for authentication, but they differ in their length and complexity.
A passcode is typically longer than a PIN and can include letters, numbers, and symbols.
A PIN is usually a 4-6 digit number.
Passcodes are generally considered more secure than PINs.
Examples of passcodes include the password for your email account or the code to unlock your phone.
Examples of PINs include the code to access your bank account or the PIN to unlock your SIM card.
Q94. Reverse the each word of the string
Reverse each word of a given string.
Split the string into words using space as a delimiter.
Reverse each word using built-in functions or loops.
Join the reversed words to form the final string.
Q95. What is time complexity of bubble sort? Can we do anything to reduce time in bubble sort?
Bubble sort has a time complexity of O(n^2). It can be optimized by adding a flag to check if any swaps were made.
Bubble sort compares adjacent elements and swaps them if they are in the wrong order.
It repeats this process until the array is sorted.
Adding a flag to check if any swaps were made can reduce the time complexity to O(n) in the best case.
However, in the worst case, it still has a time complexity of O(n^2).
Q96. What are the access specifiers?
Access specifiers are keywords in object-oriented programming languages that determine the visibility of class members.
Access specifiers are used to restrict access to class members.
There are three access specifiers: public, private, and protected.
Public members can be accessed from anywhere in the program.
Private members can only be accessed within the class.
Protected members can be accessed within the class and its subclasses.
Example: class MyClass { public: int x; private:...read more
Q97. what is the difference between overloading and overriding?
Overloading is when multiple methods have the same name but different parameters, while overriding is when a subclass provides a specific implementation of a method already defined in its superclass.
Overloading is compile-time polymorphism, while overriding is runtime polymorphism.
Overloading is achieved within the same class, while overriding occurs between a superclass and its subclass.
Overloading is used to provide different ways of calling the same method, while overridin...read more
Q98. What is the difference between Saving and current account
Saving account is for saving money and earning interest while current account is for frequent transactions.
Saving account earns interest while current account does not.
Saving account has a limit on the number of transactions while current account does not.
Current account is meant for frequent transactions while saving account is not.
Saving account has a higher interest rate than current account.
Examples of saving accounts include fixed deposit accounts, recurring deposit acco...read more
Q99. What is difference between service catalog and order guide and record producer
Service catalog, order guide, and record producer are different components in ServiceNow for managing and fulfilling service requests.
Service catalog is a centralized repository of services that users can request.
Order guide is a collection of related services grouped together for easy selection and ordering.
Record producer is a form-based interface that allows users to create records in different tables.
Service catalog provides a self-service portal for users to browse and r...read more
Q100. What is array, diffrence between C and C++, what is object oriented programming, what projects who have worked on.
Questions on arrays, C/C++, OOP, and past projects for Project Engineer role.
An array is a collection of similar data types stored in contiguous memory locations.
C is a procedural language while C++ is an object-oriented language.
Object-oriented programming is a programming paradigm that uses objects to represent and manipulate data.
Examples of past projects worked on should be provided.
Top HR Questions asked in null
Interview Process at null
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month