Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
43 views37 pages

Interview Questions Past

Interview Questions Past

Uploaded by

muneeb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views37 pages

Interview Questions Past

Interview Questions Past

Uploaded by

muneeb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

General

○ Would you be comfortable working at night?


● HR Questions:
○ Your 3 weaknesses and strengths?
○ Expected Salary?
○ Are you OK with what we do.
○ What are your hobbies and stuff
○ Tell us something about yourself
○ Introduce yourself. Tell us about your educational and professional background (if any).
○ What is the perception of i2c among fastians.
○ What differentiates you from other candidates?
○ Biggest accomplishment?
○ Role in FYP?
○ Difference between smart work and hard work (what do you prefer? explain?)
○ Any kind of negative remarks about this company?
○ What makes you frustrated?
○ Did you participate in any co-curricular activity?
○ What are your passions?
○ You might get other job offers, so what would be the reasons to choose i2c over other
companies?
○ Do you have any questions to ask from us?
○ Why is your CGPA low? (incase you have a low CGPA)
○ Do you have any plans for further studies?
○ You might also be asked something related to the essay you wrote in the HR assessment.
● Technical:
○ (Just basic CONCEPT of the following, not much detail.)
○ Basic intro of your FYP
○ What was your part in fyp
○ Basic intro of any other projects you have done
○ Tell some git commands

○ What is difference b/w encryption and compression


○ Tell some encryption algos
• Triple DES
• RSA
• BlowFish
• TwoFish
• AES

○ How would you encrypt any given string?

○ What is backlog

Items are ordered by priority


○ How long is a Sprint

Sprint is 2-4 weeks long (agile sprint is no more than one month long)
○ DETAILED explanation of FYP
○ Applications of FYP
○ Name some non-functional requirements of your FYP (+ name some general
non-functional requirements).
○ Why do we use ftp protocol
File transfer protocol is protocol to transfer files on network from one machine to
another
○ What is serialization and deserialization?
Serialization in Java is a mechanism of writing the state of an object into a byte-
stream.

The reverse operation of serialization is called deserialization where byte-stream


is converted into an object
○ Regex and How to use regex on a particular initial?

○ Write recursive factorial function?

○ Difference between array and vectors?


Vector is synchronized and array is not synchronized.

○ What are collections?

○ What is static and final?

○ What is garbage collection? How would you implement it?


In computer science, garbage collection (GC) is a form of automatic memory management.
The garbage collector, or just collector, attempts to reclaim garbage, or memory occupied
by objects that are no longer in use by the program.
The technique that accomplishes this is known as Garbage Collection.
Programs that do not de-allocate memory can eventually crash when there
is no memory left in the system to allocate. These programs are said to
have memory leaks.
When there are no references to an object, it is assumed to be no longer
needed, and the memory, occupied by the object can be reclaimed. There
is no explicit need to destroy an object as Java handles the de-allocation
automatically.

○ What is CNN?

○ How would you make an artificially intelligent machine?


○ What are access specifiers?
Access specifiers define how the members (attributes and methods) of
a class can be accessed.
Jis sy ham class ky variables or methods ki access ko control karty han
○ Which protocol should be used while making a chat system ?
XMPP(extensible message presence protocol)
Extensible Messaging and Presence Protocol (abbreviated as XMPP) is an open source and
extensible protocol that was originally referred as Jabber. XMPP protocol supports the
transmission of current information such as data. As a messaging protocol, it can only be applied
effectively by moving through an appropriate transport binding such as TCP/IP, HTTP, or
WebSocket. Some of the XMPP applications include Gtalk and Whatsapp.
○ How can you create a heap overflow ?

2. if we dynamically allocate large number of variables


Stack overflow
Stack is a special region of our process’s memory which is used to store local
variables used inside the function, parameters passed through a function and their return
addresses. Whenever a new local variable is declared it is pushed onto the stack. All the
variables associated with a function are deleted and memory they use is freed up, after the
function finishes running. The user does not have any need to free up stack space manually.
Stack is Last-In-First-Out data structure.
1.If we declare large number of local variables or declare an array or matrix or any
higher dimensional array of large size can result in overflow of stack.
2. If function recursively call itself infinite times then the stack is unable to store large
number of local variables used by every function call and will result in overflow of stack.
● Database
○ Normal Forms.
○ Anomalies
○ DDL, DML
○ Views,Triggers
○ Write a query to delete a table
Drop table tablename
○ How will you create a table with images?

○ When do we use varchar

○ What is noSQL
NoSQL databases are databases that store data in a format other than relational
tables.
NoSQL databases allow developers to store huge amounts of unstructured data,
giving them a lot of flexibility.
○ What are transactions
○ What is rollback
○ How would you implement a rollback function if you are creating a DBMS?
○ What is SQL injection?
○ Truncate vs Delete vs DROP
○ Write a query to select average salary department wise
○ Delete a row
○ How are views helpful/Advantage of views in business layer?
○ Why is TRUNCATE a DDL?
TRUNCATE actually drops & re-creates the table, and resets the table's metadata
○ How to use a BLOB?

You can also store large files as disk files and URL’s in columns but this can result in loss of track
and movement of files along with the database.
○ What is ACID?
○ What is projection?

○ How to delete a column from a table?

● O.S:
○ Type of File Systems (just names)
controls how data is stored and retrieved(ways of organizing and storing files on hard
drive.
windows file sytems are FAT(file allocation table) and NTFS(new technology file system)
Ubuntu’s is ext
macOS are HFS+ and APFS
Unix is UFS and FFS

○ components of List operating systems


○ List data structures used in OS.
○ Where is a heap used in OS.
○ How does a file system run/work
○ What are some commands of assembly language?
○ What is fragmentation?

https://www.includehelp.com/operating-systems/fragmentation.aspx
https://www.tutorialspoint.com/difference-between-internal-fragmentation-and-external-
fragmentation
○ List some terminal commands
● C.N:
○ What are ports?
In computer networking, a port is a communication endpoint
The most common protocols that use port numbers are the Transmission Control
Protocol (TCP) and the User Datagram Protocol (UDP).
Higher-numbered ports are available for general use by applications and are known
as ephemeral ports.
0-65535
○ List network protocol
https://www.w3schools.in/types-of-network-protocols-and-their-uses/
○ Which protocol would you use if you wanted to create Twitter? (ans: HTTP, not TCP)
https
○ How to prevent a DDos attack ?
A DDoS attack happens when a hacker sends a flood of traffic to a network or server in order
to overwhelm(overload) the system and disrupt its ability to operate.

If you know what to expect when your traffic hits its upper limit, you can put rate limiting into
place. That means that the server will only accept as many requests as it can handle.

Another technique to prevent attacks is to hire a DDoS mitigation service. Their way of
preventing attacks is to route all incoming traffic through a filter, so that only genuine traffic
hits your website or application.
Increase Internet Bandwidth and Server Capacity
Using web application firewalls is a great way to protect larger enterprise-level applications.
A firewall can detect and prevent DDoS attacks by monitoring unusual spikes in traffic and
blocking them.
A content distribution network, or CDN, can balance out website traffic by spreading it
across different servers located around the globe.
● C.A:
○ Fragmentation.
○ Virtual Memory
○ What data structure would you use to implement Main Memory?
○ Caches are different from Main Memory, so what data structure would you use to
implement a cache?
● OOP:
○ Static Variable
○ Singleton Class
○ What is open/closed principle
Software entities should be open for extension, but closed for modification.

○ What is cohesion

○ What is single responsibility principle


In programming, the Single Responsibility Principle states that every module or class should
have responsibility over a single part of the functionality provided by the software.
○ Composition vs inheritance

○ What is coupling?
○ How can you increase coupling? How would you increase coupling in a SINGLE class?
○ Is coupling high in composition?
○ How can you reduce coupling?
○ What are immutable strings in Java.
An immutable class is simply a class whose instances cannot be
modified
An important point to note here is that, while the String object is immutable, its reference
variable is not. So that’s why, in the above example, the reference was made to refer to a
newly formed String object.
Because java uses the concept of string literal.Suppose there are 5 reference
variables,all referes to one object "sachin".If one reference variable changes the value
of the object, it will be affected to all the reference variables. That is why string
objects are immutable in java.

● Data Structures:
○ Basic definition of stack and queue.
Stack A stack is a linear data structure in which elements can be inserted and deleted only
from one side of the list, called the top. A stack follows the LIFO (Last In First Out) principle,
i.e., the element inserted at the last is the first element to come out. The insertion of an
element into stack is called push operation, and deletion of an element from the stack is
called pop operation.
A queue is a linear data structure in which elements can be inserted only from one side of
the list called rear, and the elements can be deleted only from the other side called
the front. The queue data structure follows the FIFO (First In First Out) principle, i.e. the
element inserted at first in the list, is the first element to be removed from the list. The
insertion of an element in a queue is called an enqueue operation and the deletion of an
element is called a dequeue operation. In queue we always maintain two pointers, one
pointing to the element which was inserted at the first and still present in the list with
the front pointer and the second pointer pointing to the element inserted at the last with
the rear pointer.
○ Name some searching algorithms.
Linear
Binary

○ Explain a code to delete second last element of a linked list


○ What is the difference between a set and a list/array?
List is a type of ordered collection that maintains the elements in insertion order while Set is
a type of unordered collection so elements are not maintained any order. List allows
duplicates while Set doesn't allow duplicate elements
he biggest difference between an Array & Set is that Arrays can have duplicate values
whereas Sets cannot. The other big difference is that data in an array is ordered by index
whereas Sets use keys & the elements are iterable in the order of insertion.Oct 8, 2018
● Java:
○ What is the role of jdbc/odbc?
JDBC Driver is a software component that enables java application to interact
with the database.

○ What is the difference between immutable and mutable strings? (Strings are always
immutable!)
○ How can you make a String mutable?
With Mutable string, we can change the contents of an existing object
which does not result in the creation of a new object.
As already covered, the mutable string in java can be created using
StringBuffer and StringBuilder classes.

○ Null pointer exception


NullPointerException is thrown when program attempts to use an object reference
that has the null value.
To avoid the NullPointerException, we must ensure that all the objects are initialized
properly, before you use them
○ What are packages in Java?

1) Java package is used to categorize the classes and interfaces so that they can be
easily maintained.

2) Java package provides access protection.

3) Java package removes naming collision.

○ What is final in java why we make a final method ?


So that it cannot be overriden
● Software Testing:
○ Describe the types of ST
https://www.softwaretestinghelp.com/types-of-software-testing/

○ What is unit testing

○ What is assert statements (in junit)


An assert statement is used to declare an expected boolean condition in a program. If the
program is running with assertions enabled, then the condition is checked at runtime. If the
condition is false, the Java runtime system throws an AssertionError .
○ How did you perform white box and black box testing (if you have done it)

● Assembly:
○ What does shift left operation do mathematically? (Ans: multiplication by 2)
● Software Engineering:
○ What is SOLID Principle?
o Software reengineering?
Software Reengineering is the process of updating software without affecting its
functionality. This process may be done by developing additional features on
the software and adding functionalities that may or may not be required but considered to
make the software experience better and more efficient.
UML diagrams
Unified modelling language

It is based on diagrammatic representations of software components.

Exception?

An exception is an unwanted or unexpected event, which occurs during the execution of a


program i.e at run time, that disrupts the normal flow of the program’s instructions.
AGILE???

AGILE methodology is a practice that promotes continuous iteration of


development and testing throughout the software development lifecycle of
the project. Both development and testing activities are concurrent unlike
the Waterfall model

Waterfall model??
The Waterfall Model was the first Process Model to be introduced. It is also referred
to as a linear-sequential life cycle model. It is very simple to understand and use.
In a waterfall model, each phase must be completed before the next phase can begin
and there is no overlapping in the phases.
The Waterfall model is the earliest SDLC approach that was used for software
development.
The waterfall Model illustrates the software development process in a linear
sequential flow. This means that any phase in the development process begins only
if the previous phase is complete. In this waterfall model, the phases do not overlap.
Prototype Model
This model is used when the customers do not know the exact project requirements
beforehand.

This prototype is developed based on the currently known requirements.


Prototype model is a software development model. By using this prototype, the
client can get an “actual feel” of the system, since the interactions with prototype
can enable the client to better understand the requirements of the desired
system.
Session Management
HTTP protocol and Web Servers are stateless, what it means is that for web server every request is a new
request to process and they can’t identify if it’s coming from client that has been sending request previously.

JSON vs XML

Verification vs Validation
Client-server arhitecture
MVC
Difference between Inheritance & Polymorphism
What is HTML
Functional VS non Functional Requirnments
Rest
Rest is way of communication within components on web
AJAX

Asynchronous and Synchronous


Java platform independent
Check power of two

Another
Heap
Rotate array by number k

Annotations
for form validations in mvc

You might also like