Interview Questions and Answers for 'Io' | Search Interview Question - javasearch.buggybread.com
Javasearch.buggybread.com

Search Interview Questions


 More than 3000 questions in repository.
 There are more than 900 unanswered questions.
Click here and help us by providing the answer.
 Have a video suggestion.
Click Correct / Improve and please let us know.
Label / Company      Label / Company / Text

   



Interview Questions and Answers - Order By Rating

   next 30
 Q31. What is Throwable ?Core Java
Ans. Throwable in java is a class that is the superclass of all exceptions and errors which may occurs in java program.It extends obcect class.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     exception handling   throwable     Asked in 1 Companies      basic


 Q32. What is SNMP ?Networking
Ans. SNMP or Simple Network Management protocol is an application layer protocol for exchanging management information between network devices.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve          Asked in 15 Companies


 Q33. Explain switch and router
 This question was recently asked at 'Reliance Jio'.This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve          Asked in 1 Companies


 Q34. What are the types of clouds in cloud computing ?Cloud Computing
Ans. Private, Public, Hybrid, Community

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     Google Cloud Platform (GCP)     Asked in 1 Companies


 Q35. Can we override behavior of a collection class ? How ?Core Java
Ans. Yes. We can do that.

1. We can create own own implementation class extending the collection class and then override the behavior method.

2. We can override the behavior at the time of instantiation of class as following

List<MyType> list = new ArrayList<MyType>() {
public boolean add(MyType mt) {
super.add(mt);
Collections.sort(list, comparator);
return true;
}
};

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     collections


 Q36. Explain Rest architectureRest
 This question was recently asked at 'Motorola Solutions,DXC Technology'.This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve          Asked in 2 Companies


 Q37. Can you share your experience with encoding and encryption ?Encoding
 This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     encoding  encryption


 Q38. How would you handle clustering on multiple servers? Server
 This question was recently asked at 'Sifi'.This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     production support     Asked in 1 Companies


 Q39. What are the mutable and immutable data types ?
 This question was recently asked at 'Technicolor,Velotio'.This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve          Asked in 2 Companies


 Q40. Can we use combination of two authentication mechanism in an application ? Narrate with an example.Authentication
Ans. Yes We can use. Negotiate is a very good example with NTLM fallback mechanism over Kerberose.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     


 Q41. What are different ways a user can be authenticated other than username / password ?Authentication
Ans. IP Authentication
IP Range Authentication
Certificates
Authentication Cards

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     


 Q42. Have you ever worked on any project dealing with authentication and authorization ?Authentication
Ans. Yes, I have worked on single sign on project.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     


 Q43. Difference between injection and auto wiring.Spring
 This question was recently asked at 'Yudiz Solutions'.This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve          Asked in 1 Companies


 Q44. SQL Questions.Database
 This question was recently asked at 'Eurofins IT Solutions'.This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve          Asked in 1 Companies


 Q45. Can you give me a use case where you utilized serialization in your project code?Core Java
Ans. we use serialization when we send response to client in JSON format.(the process of converting model object into json is nothing but serialization

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     serialization     Asked in 1 Companies


 Q46. Difference between Query param and path param ?
 This question was recently asked at 'GSpann Technologies, Motorola Solutions'.This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve          Asked in 2 Companies


 Q47. Write SQL query to join 2 tables ?SQL
Ans. Select * from table1 join Select * from table2

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     database     Asked in 1 Companies


 Q48. Can you tell us a use case of reflection in java that you have applied ?Design
 This question was recently asked at 'CenturyLink'.This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     reflection     Asked in 1 Companies


 Q49. what is dispatcher servlet@componentScan use ?Spring Framework
Ans. @ComponentScan in a Spring Application.

With Spring, we use the @ComponentScan annotation along with the @Configuration annotation to specify the packages that we want to be scanned. @ComponentScan without arguments tells Spring to scan the current package and all of its sub-packages.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     ComponentScan  dispatcher  @ComponentScan annotation  @Configuration annotation     Asked in 1 Companies


 Q50. What is stereotype annotation ?Spring
Ans. These annotations are used to create Spring beans automatically in the application context. The main stereotype annotation is @Component . @Controller: Which is used to create Spring beans at the controller layer. The stereotype annotations in spring are @Component, @Service, @Repository and @Controller

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     stereotype annotation   stereotype annotation spring     Asked in 1 Companies


 Q51. What are different awt constructs ?
 This question was recently asked at 'Sabre Corporation'.This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve          Asked in 1 Companies


 Q52. What are the distributed caches ?Server
 This question was recently asked at 'RiseSmart India'.This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     caching  server  production support     Asked in 1 Companies


 Q53. If we have a return statement inside the finally block, Then what will happen ?Core Java
Ans. Returning from inside a finally block will cause exceptions to be lost. A return statement inside a finally block will cause any exception that might be thrown in the try block to be discarded.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     exception handling  finally block     Asked in 1 Companies


 Q54. What is the concept of hibernate versioning ?Hibernate
 This question was recently asked at 'Tata Consultancy (TCS)'.This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     hibernate versioning     Asked in 1 Companies


 Q55. What is cluster ?
 This question was recently asked at 'idealake information technologies'.This question is still unanswered. Can you please provide an answer.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve          Asked in 1 Companies


 Q56. Difference between HashMap and Dictionary in Java ?Core Java
Ans. HashMap implements the Map interface while the Dictionary does not.

HashMap was introduced after HashTable and Dictionary.

Dictionary is currently obsolete in java.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     hashmap  dictionary class


 Q57. difference between ArrayList and array ?Core Java
Ans. ArrayList is a variable length collection class whereas arrays are fixed length primitive structure.

We can use generics with arraylist but not with arrays.

We can store primitive data types within arrays but can't with ArrayList. In ArrayList that needs to be converted to Wrapper objects.


 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     arraylist  arrays  collection classes  collections      basic        frequent


 Q58. Is HashMap Synchronized ?Core Java
Ans. No HashMap isn't synchronized. ConcurrentHashMap and Hashtable are synchronized.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     hashmap  synchronization


 Q59. Explain CloneNotSupportedException ?Core Java
Ans. If we do not mention, Cloneable Interface to the Class which we want to Clone then we get this exception, only if we try to clone an object

Like:
public class TestClone{
@Override
   protected Object clone() throws CloneNotSupportedException {
      return super.clone();
   }
}

In Main, You try to do:
TestClone clone = new TestClone();
      
      TestClone clone2 = (TestClone) clone.clone();

You will get CloneNotSupportedException.

Just add -> public class TestClone implements Cloneable {

and things are fixed.

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     exceptions handling  cloning


 Q60. Explain when you would decide to use open authentication ?Authentication
Ans. Google OAuth can be used when we want to grant the access of our google credentials to the service provider ( most likely a cloud-based mobile application) by using the option ' Login via Google'

 Help us improve. Please let us know the company, where you were asked this question :   

   Like         Discuss         Correct / Improve     open authentication     Asked in 1 Companies


previous 30   next 30

Help us and Others Improve. Please let us know the questions asked in any of your previous interview.

Any input from you will be highly appreciated and It will unlock the application for 10 more requests.

Company Name:
Questions Asked: