Interview Questions and Answers for 'C' | Search Interview Question - javasearch.buggybread.com
Javasearch.buggybread.com

Search Interview Questions


 More than 3000 questions in repository.
 There are more than 900 unanswered questions.
Click here and help us by providing the answer.
 Have a video suggestion.
Click Correct / Improve and please let us know.
Label / Company      Label / Company / Text

   



Interview Questions and Answers - Order By Newest

   next 30
 Q481. What is the relation between classes in Java ?Core Java
Ans. There are different types of relationship between classes

Inheritance - Also called is-a relationship, Child class object carries the body of the Parent class when initiated. Moreover there are certain privileges attach to method overriding to the classes related this way. This relationship exist for code reuse, method overriding and interfacing ( through abstract class ).

Composition - Also called has-a relationship. Class objects carries a reference to other class objects when instantiated. This relationship exist for work flow / work delegation.

Inner / Nested class - It’s a relationship that encapsulates the inner class or it’s object within the outer class. This relationship exist for encapsulation / security.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     


 Q482. Find Fibonacci first n numbers using recursion ?Core Java
Ans. public int fibonacci(int n) {
if(n == 0)
return 0;
else
if(n == 1)
return 1;
else
return fibonacci(n - 1) fibonacci(n - 2);
}

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve          Asked in 1 Companies


 Q483. Have you ever faced problems with rounding decimal places and what were the reasons ? Core Java
Ans. 1. The problem with double (x*100)/100 doesn't return exact x but few fractions lesser than x and then if you are using floor rounding , it makes a big difference

2. Rounding only after getting a result vs rounding each outcome of 2 operand make difference

3. Usage of inappropriate Rounding mode and Rounding scale.

4. Results with double and BigDecimal

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     BigDecimal  double  round  decimal


 Q484. Write code to redo and undo without using system functions ?Design
 This question was recently asked at 'Aloha Technologies'.This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve          Asked in 1 Companies


 Q485. What development process / methodology are you using ? Are you using agile ?General
 This question was recently asked at 'Spillman Technologies'.This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve          Asked in 1 Companies


 Q486. Can we have multiple inheritance in java using abstract class ?Core Java
Ans. No

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     abstract class   multiple inheritance  object oriented programming (oops)  oops concepts     Asked in 2 Companies


 Q487. Describe structure of a Web application.architecture
Ans. WEB APP |WEB-INF - META-INF | | | META-INF.MF | lib - WEB.xml - Classes

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     web application     Asked in 3 Companies      intermediate        frequent


  Q488. What are the types of authentication used in Web services ?Web Service
Ans. Encrypted User Name / Password
Encrypted Password within Cookie
Encrypted Tokens
IP
Client Certificates
Oauth

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     authentication  security  web service     Asked in 12 Companies      basic        frequent


 Q489. Does use of Final class enforces composition over Inheritance in Java ? Core Java
Ans. Yes, to a certain extent. But the objective for Final class could be beyond just enforcing composition as certain classes might have been created without inheritance or composition in mind.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     final class   composition  object oriented programming (oops)  oops concepts  inheritance  object oriented programming (oops)  oops concepts  composition  object oriented programming (oops)  oops concepts vs inheritance  object oriented programming (oops)  oops concepts      expert


 Q490. What could be the reasons for restricting inheritance using final class ?Core Java
Ans. 1. Enforcing composition over inheritance
2. Restricting overriding of certain methods
3. Final methods are faster than regular instance methods
4. Enforcing Immutability

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     final class   reasons for final class   restricting inheritance  object oriented programming (oops)  oops concepts      expert


 Q491. Explain OAuth.Authentication
Ans. OAuth is an open-standard authorization protocol or framework that describes how unrelated servers and services can safely allow authenticated access to their assets without actually sharing the initial, related, single logon credential. Like using Google or Facebook to login to something.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve          Asked in 17 Companies


 Q492. Between Encrypted Password authentication and IP Authentication , which one would you prefer and why ?Authentication
Ans. IP authentication is very restrictive, if IP changes for some reason then getting the new IP white listed on the server firewall could run your day pretty long. I would prefer encrypted password authentication cause it is not affected by IP changes and not limited to a white listed IP, I could use any different machine and get through authentication without any hassle.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     ip authentication   password authentication        frequent


 Q493. Write code to create a folder if it doesn't exist.Core Java
Ans. File folder = new File(path);
      
if(!folder.exists()){
try {
folder.mkdir();
            
} catch (Exception e) {}
}

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     code  coding  file handling      basic


  Q494. Difference between Arrays and ArrayList ?Core Java
Ans. Both Arrays and ArrayLists are used to store elements. Elements can be either primitives or objects in case of Arrays, but only objects can be stored in Arraylist. Array is a fixed length data structure while arraylist is variable length collection class. Once created, you cannot change the size of the arrays, but arraylists can dynamically resize itself when needed.Another notable difference between Arrays and Arrayslist is that arary is part of core java programming and array list is part of collection classes

  Sample Code for arrays arraylist

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     array  arraylist  array vs arraylist     Asked in 7 Companies      basic        frequent


 Q495. Can we declare an array without assigning the size of an array? Core Java
Ans. No, It will throw compile time error saying "must provide either dimension expressions or an array initializer"

Alternatively we can provide array initializer like

String[] strArray = new String[]{"Buggy","Bread"};

which will initialize it to size 2 with values as "Buggy" and "Bread"


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     arrays  array initialization


 Q496. What is meant by "unreachable code" ? Can you write a code segment explaining this ?Core Java
Ans. Unreachable code is a code segment that can never be executed in any case. For example -

int x = 5;
return;
System.out.println(x);

In this code , 2nd line will return the control out of the method and hence 3rd line will never get executed and hence is unreachable code. This will be caught at compile time only.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     unreachable code


 Q497. What is the difference between log4j and java logging api.Log4j
Ans. log4j is by apache while java logging api is given by sun. log4j is more powerful,extensible and simple to use than java logging api.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve          Asked in 1 Companies


 Q498. Why doesn't this code give compile time error when we are clearly trying to add an integer element to an array of Strings

Object[] strArray = new String[2];
strArray[0] = 5;
Core Java
Ans. Because the reference is of Object Array and the resolution of what it holds is identified at the runtime.

String[] strArray = new String[2];
strArray[0] = 5;

would have given the compile time array as the reference is of String array.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     arrays


 Q499. What would you do if you see an error thrown by a lambda function as "Access Denied" while doing something with S3 ?Amazon Web Services (AWS)
Ans. Just like people , AWS resources too have execution roles or permissions. Seems like in such a situation Lambda function may not have sufficient privileges to perform operations on S3. For example - The execution role of Lambda may just have read permissions on S3 and we may be trying to perform PutObject operation.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     aws s3  aws storage  amazon cloud storage  amazon s3  aws lambda  aws serverless computing  amazon cloud serverless computing  amazon lambda


 Q500. What will happen if there are no interfaces in Java ?Core Java
Ans. Abstract classes can take care of that to a certain extent. Though they are little heavier than Interfaces but An abstract class with all abstract methods and no instance variables will be able to help with everything that currently an interface does.

The only problem is that a class can only extend one class whereas it can implements multiple interfaces and that is the reason Interfaces were introduced in Java, i.e to get over the problem of multiple inheritance.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     interfaces      expert


 Q501. How to avoid cloning, serialization in the singleton class ?Design
Ans. For Cloning-exception,For deserialization-read.resolve()

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     singleton  cloneable  serializable  serialization  cloning     Asked in 1 Companies


 Q502. What is the use of Amazon Glacier?Amazon Web Services (AWS)
Ans. Its a storage option provided by AWS which is even cheaper than S3. As the objects are archieved before saving, retrieval time is pretty bad.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     aws glacier


 Q503. What is AWS Storage Gateway?Amazon Web Services (AWS)
Ans. It's an on premise virtual appliance that can be used as cache to store s3 locally at customer site.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     aws storage gateway


 Q504. What are the drawbacks of using Spot EC2 instances ?Amazon Web Services (AWS)
Ans. You cannot reserve the time slot and they can be made to use whenever they are available.

AWS can Terminate the EC2 instance on their own even if it's in use.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     aws ec2  aws computing  amazon cloud computing  amazon ec2  aws ec2  aws computing  amazon cloud computing  amazon ec2 spot


 Q505. What is the use case for AWS Gateway cached , stored and VTL ? Amazon Web Services (AWS)
Ans. AWS Cached - Low Availability than AWS Stored, Lower cost than AWS Stored

AWS Stored - High Availability, High Local Storage Cost

AWS VTL - S3 Used as Back up only.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     aws gateway  aws gateway cached  aws gateway stored  aws gateway vtl


 Q506. What are the things to consider while provisioning computing in AWS ?Amazon Web Services (AWS)
Ans. Service ( EC2, Lambda etc )
AMI ( Operating System and Softwares )
Instance Type ( T,M, R etc )
EBS ( Volume Type , Size )
Price Class ( OnDemand, Dedicated etc )

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     aws computing


 Q507. How have you configured Security Groups ?Amazon Web Services (AWS)
Ans. AWS console >> security groups >> Create security group >> Configure security group bases on Network requirement of EC2 instance

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     aws security group


 Q508. What is a Volume Snapshot ?Amazon Web Services (AWS)
Ans. Snapshots are point in time copies of Volume.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     aws ebs  aws ebs volume


 Q509. Which of the Load balancer - Application / Network provides advanced features ? What is the use of other Load Balancer than if one provides advanced feature than other ?Amazon Web Services (AWS)
Ans. Application Load Balancer is high level ( Level 7 Networking Layer ) and provides better features and flexibility than Network Load Balancer ( Level 4 Network Layer )

Network Load Balancer is turn provides better performance as it regulates raw traffic.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     aws elb  amazon elb


 Q510. What is the purpose of EC2 Health check ?Amazon Web Services (AWS)
Ans. We can use this check for variety of things -

1. Monitoring the status / Alarms in case it's down
2. Regulating traffic to healthy instances only through Load Balancer

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     aws ec2  aws computing  amazon cloud computing  amazon ec2


previous 30   next 30

Help us and Others Improve. Please let us know the questions asked in any of your previous interview.

Any input from you will be highly appreciated and It will unlock the application for 10 more requests.

Company Name:
Questions Asked: