Interview Questions and Answers - Order By Rating Q31. How can we protect an application from an XSS attack ? Security
Ans. By properly encoding data while persisting as well as retrieval. Help us improve. Please let us know the company, where you were asked this question : Like Discuss Correct / Improve  xss attack  web security Asked in 3 Companies Ans. Open the AWS CloudFormation console at https://console.aws.amazon.com/cloudformation . Create a new stack by using one of the following options: Choose Create Stack. This is the only option if you have a currently running stack. Help us improve. Please let us know the company, where you were asked this question : Like Discuss Correct / Improve  aws cloud formation Asked in 1 Companies Ans. There are multiple types of security GCP provides to every customer. Data, Network, Compute, and Services. Each service have its own security layer and Google provides clients to build as per the GCP best practices like building VPC, IAM, Firewall rules and so on Help us improve. Please let us know the company, where you were asked this question : Like Discuss Correct / Improve  Google Cloud Platform (GCP) Asked in 1 Companies Ans. It is a logical grouping of instance with a single availability zone to prevent latency. Help us improve. Please let us know the company, where you were asked this question : Like Discuss Correct / Improve  aws placement group Asked in 1 Companies Ans. Budgets and Alerts
Reports
Quotas Help us improve. Please let us know the company, where you were asked this question : Like Discuss Correct / Improve  gcp billingAns. On Demand service restricts cost by paying only for the use and Self Service saves cost by reducing intermediary human resource cost. Help us improve. Please let us know the company, where you were asked this question : Like Discuss Correct / Improve  onDemand infrastructure  Google Cloud Platform (GCP) Ans. With resource pooling and Pay as per use , Bigger companies like Google and Amazon can buy Large physical hardware and employ economy of scale and hence resulting in cost saving for customers. Help us improve. Please let us know the company, where you were asked this question : Like Discuss Correct / Improve  Google Cloud Platform (GCP)Ans. Alerts only let customer knows of any excessive usage whereas Quota restricts the usage beyond a certain point. Help us improve. Please let us know the company, where you were asked this question : Like Discuss Correct / Improve  GCP BillingAns. Compute
Network
Storage
Big Data
Machine Learning Help us improve. Please let us know the company, where you were asked this question : Like Discuss Correct / Improve  Ans. It's PAAS ( Platform as a service ) Help us improve. Please let us know the company, where you were asked this question : Like Discuss Correct / Improve  Google App EngineAns. Cloud computing helps saving overall cost for infrastructure and service usage through following -
1. On demand Services and elasticity - You only pay for what you use. Less Ideal time.
2. Resource Pooling
3. Self Service - Less involvement of human resources Help us improve. Please let us know the company, where you were asked this question : Like Discuss Correct / Improve  Google Cloud Platform (GCP)  Amazon Web Service (AWSAns. IAM is used to define the level of access to GCP services Help us improve. Please let us know the company, where you were asked this question : Like Discuss Correct / Improve  GCPAns. Virtual machines are IAAS in GCP which can called Compute Engine Help us improve. Please let us know the company, where you were asked this question : Like Discuss Correct / Improve  Google cloud Platform  GCP Q44. Can you explain integration between Spring and Hibernate ? Hibernate
This question was recently asked at 'HCL Technologies'.This question is still unanswered. Can you please provide an answer. Help us improve. Please let us know the company, where you were asked this question : Like Discuss Correct / Improve  Spring framework  Hibernate Orm Asked in 1 Companies This question is still unanswered. Can you please provide an answer. Help us improve. Please let us know the company, where you were asked this question : Like Discuss Correct / Improve   Q46. differences between drop , delete and truncate Database
This question was recently asked at 'HCL Technologies'.This question is still unanswered. Can you please provide an answer. Help us improve. Please let us know the company, where you were asked this question : Like Discuss Correct / Improve   Asked in 1 Companies Q47. How to delete a node from linked list if u do not have head and only have a pointer to the element which has to be removed ? Data Structure
This question was recently asked at 'LifCare'.This question is still unanswered. Can you please provide an answer. Help us improve. Please let us know the company, where you were asked this question : Like Discuss Correct / Improve   Asked in 1 Companies Q48. How many threads can access a concurrent hashmap when the hashcode is overridden and always returns a zero. Data Structure
Ans. The impact of both cases (fixed hashcode or random hashcode for keys) will have same result and that is "unexpected behavior". The very basic need of hashcode in HashMap is to identify the bucket location where to put the key-value pair, and from where it has to be retrieved.
If the hashcode of key object changes every time, the exact location of key-value pair will be calculated different, every time. This way, one object stored in HashMap will be lost forever and there will be very minimum possibility to get it back from map.
For this same reason, key are suggested to be immutable, so that they return a unique and same hashcode each time requested on same key object. Help us improve. Please let us know the company, where you were asked this question : Like Discuss Correct / Improve   Asked in 1 Companies Q49. Explain memory allocation and deallocation. C++
This question was recently asked at 'Informatica'.This question is still unanswered. Can you please provide an answer. Help us improve. Please let us know the company, where you were asked this question : Like Discuss Correct / Improve   Asked in 1 Companies Q50. What are reference variables in c C++
This question was recently asked at 'Informatica'.This question is still unanswered. Can you please provide an answer. Help us improve. Please let us know the company, where you were asked this question : Like Discuss Correct / Improve   Asked in 1 Companies Q51. What is size of structure in c ? C++
This question was recently asked at 'Informatica'.This question is still unanswered. Can you please provide an answer. Help us improve. Please let us know the company, where you were asked this question : Like Discuss Correct / Improve   Asked in 1 Companies This question was recently asked at 'Informatica'.This question is still unanswered. Can you please provide an answer. Help us improve. Please let us know the company, where you were asked this question : Like Discuss Correct / Improve   Asked in 1 Companies Q53. Differentiate osi and tcp/ip models and describe them Networking
This question was recently asked at 'Informatica'.This question is still unanswered. Can you please provide an answer. Help us improve. Please let us know the company, where you were asked this question : Like Discuss Correct / Improve   Asked in 1 Companies Ans. Using Collections.sort() Help us improve. Please let us know the company, where you were asked this question : Like Discuss Correct / Improve   Asked in 1 Companies Q55. What is the O notation for the ArrayList and List? And which one would you choose to insert item in the middle? Data Structure
This question was recently asked at 'ExpertSoft'.This question is still unanswered. Can you please provide an answer. Help us improve. Please let us know the company, where you were asked this question : Like Discuss Correct / Improve   Asked in 1 Companies Q56. What is a composite primary key and foreign key ? Database
Ans. The combination of values from multiple columns in the composite primary key must be unique for each row in the table.
A foreign key, on the other hand, is a field or set of fields in one table that refers to the primary key in another table. It establishes a relationship between two tables based on the values of the foreign key and the primary key. Help us improve. Please let us know the company, where you were asked this question : Like Discuss Correct / Improve   Asked in 1 Companies Ans. SNMP or Simple Network Management protocol is an application layer protocol for exchanging management information between network devices.
Help us improve. Please let us know the company, where you were asked this question : Like Discuss Correct / Improve   Asked in 15 Companies Q58. If you are given choice to either load object eagerly or lazily , which one would you use in case of singleton pattern ? Design
Ans. I would choose Eager as the cost for 1 additional object is too minute for any such consideration.
Eager Loading results in Faster access ( Object available at load time) at the cost of additional space.
Lazy loading results in space saving ( Object available at first use ) at the cost of access speed. Help us improve. Please let us know the company, where you were asked this question : Like Discuss Correct / Improve  design Pattern  Singleton  Lazy vs Eager Loading Q59. Difference between merge and update in hibernate Hibernate
This question was recently asked at 'Nucleus Software'.This question is still unanswered. Can you please provide an answer. Help us improve. Please let us know the company, where you were asked this question : Like Discuss Correct / Improve   Asked in 1 Companies Ans. Private, Public, Hybrid, Community Help us improve. Please let us know the company, where you were asked this question : Like Discuss Correct / Improve  Google Cloud Platform (GCP) Asked in 1 Companies