You are reading the article Top 50 Sap Fico Interview Questions & Answers In 2023 updated in October 2023 on the website Benhvienthammyvienaau.com. We hope that the information we have shared is helpful to you. If you find the content interesting and meaningful, please share it with your friends and continue to follow and support us for the latest updates. Suggested November 2023 Top 50 Sap Fico Interview Questions & Answers In 2023
Here are SAP FICO interview questions and answers for fresher as well experienced candidates to get their dream job.
1) Explain the term SAP FICO?SAP FICO stands for FI ( Financial Accounting) and CO (controlling). In SAP FICO, SAP FI take cares about accounting, preparation of financial statements, tax computations etc, while SAP CO take cares of inter orders, cost sheet, inventory sheet, cost allocations etc. It is the software that stores data, and also computes them and retrieves the result based on the current marketing scenario. SAP FICO prevents data lost and also does the verification and reporting of data.
👉 Free PDF Download: SAP FICO Interview Questions & Answers
2) What are the other modules to which ‘Financial Accounting’ is integrated?The other modules to which ‘Financial Accounting’ is integrated are
e) Controlling of financial transaction
3) In SAP FI what are the organizational elements?The organizational elements in SAP FI are:
d) Functional Area
4) Explain what is posting key and what does it control?In order to determine the transaction type which is entered in the line item, a two digit numerical is used known as ‘Posting Key’
Posting key determines
c) Field status of transaction
5) What is the company code in SAP?To generate financial statements like Profit and Loss statement, Balance sheets etc. company code is used.
6) How many Chart of Accounts can company code have?You can have one Chart of Account for one company code which is assigned.
7) For a Company Code how many currencies can be configured?There are three currencies that can be configured for a Company code, one is a local currency and two are the parallel currencies.
8) What are the options in SAP for Fiscal years?Fiscal year in SAP is the way financial data is stored in the system. In SAP, you have 12 periods and four special periods. These periods are stored in fiscal year variant that is:
a) Calendar Year: From Jan-Dec, April-March
b) Year dependent fiscal year
9) What is a ‘year shift’ in SAP calendar?SAP system does not know what is broken fiscal year e.g April 2012 to March 2013 and only understand the calendar year. If, for any business, the fiscal year is not a calendar year but the combination of the different months of two different calendar year and then one of the calendar year has to classified as a fiscal year for SAP and the month falling in another year has to be adjusted into the fiscal year by shifting the year by using the sign -1 or +1. This shift in the year is known as ‘year shift’.
Example: April 2012 to Dec 2012 is our first calendar year, and Jan 2013 to March 2013 is our second year, now if you are taking April-12 to Dec-12 as your fiscal year, then Jan-13 to March-13 automatically becomes the second year, and you have to adjust this year by using -1 shift, and vice versa if the scenario is reversed, here you will use +1 shift.
10) What is year dependent fiscal year variant?In a year dependent fiscal year variant, the number of days in a month is not as per the calendar month. For example, in year 2005, month January end on 29th, month Feb ends on 26th etc.
11) In SAP how input and output taxes are taken care?For each country tax procedure is defined, and tax codes are defined within this. There is a flexibility to either expense out the Tax amounts or capitalise the same to stocks.
12) Explain what is validations and substitutions in SAP?For each functional area in SAP Validation or Substitution is defined eg, Assets, Controlling etc. at the following levels
b) Line item Level
13) What are the application areas that use validation and substitutions?h) PC-Profit center accounting
14) In SAP what is the use of FSV ( Financial Statement Version) ?FSV ( Financial Statement Version) is a reporting tool. It can be used to extract final accounts from SAP like Profit and Loss Account and Balance Sheet. The multiple FSV’s can be used for generating the output of various external agencies like Banks and other statutory authorities.
15) What is a field status group?‘Field status groups’ control the fields which come up when the user does the transactions. In FIGL (Financial General Ledger) master, the field status group is stored.
16) What is FI-GL (Financial- General Ledger) Accounting does?To get an overview of external Accounting and accounts, G L (General Ledger) Accounting is used. It does the recording of all business transactions incorporated with all other operational areas in a software system and also ensures that the Accounting data is always complete and accurate.
17) What is the default exchange rate type which is picked up for all SAP transactions?For all SAP transaction, the default exchange rate is M (Average Rate).
18) What are the methods by which vendor invoice payments can be made?a) Manual payment without the use of any output medium like cheques etc.
b) Automatic payments like DME (Data Medium Exchange), cheques, Wire transfer
19) What are the problems when business area is configured?The problem faced when a business area is configured, is splitting of account balance which is more pertinent in the case of tax accounts.
20) For document clearing what are the customizing prerequisites ? 21) What is the importance of GR/IR ( Good Received/ Invoice Received) clearing account? 22) What is parallel and local currency in SAP?Each company code can have two additional currencies, in addition to the company code, currency entered to the company code data. The currency entered in the company code creation is called local currency and the other two additional currencies are called parallel currencies. Parallel Currencies can be used in foreign business transactions. In order to do international transaction, parallel currency can be used. The two parallel currencies would be GROUP CURRENCY and HARD CURRENCY.
23) Where can you use the internal order?To track the cost, internal orders are used; they are proposed to be incurred over on a short term basis.
24) Is it possible to calculate depreciation to the day?Yes, it is possible to calculate depreciation, to do that you have to switch on the indicator Dep. to the day in the depreciation key configuration.
25) In Asset Accounting what is the organizational assignments?In Asset Accounting, chart of depreciation is rated as the highest node, and this is assigned to the company node. All the depreciation calculations are stored under the chart of depreciation.
26) What is the importance of asset classes? What asset classes are there? 27) How capital WIP (Work In Process) and Assets accounted for in SAP? 28) What are the major components of Chart of Accounts?The major components of Chart of Accounts are:
g) Block indicator
29) What is credit control area in SAP?To immune your company from the risk of bad debts and multiple outstanding receivable, you can set a credit limit for your customer by using credit control area in SAP. With the help of SAP, you can block the deliveries to your customer based on the credit limit and the accounts receivable balance in their account which is maintained by you.
30) How can you create Credit Control Area in SAP?By using transaction code OB45 or path you can create Credit Control Area in SAP
h) Rep group
31) What is posting period variants?In fiscal year posting period is a period for which the transactions figures are updated. The posting period variants in SAP is accountable to control which Accounting period is open for posting and ensures that the closed periods remain balanced.
32) Explain in simple terms what is field status and what does it control?Field status group is a group configured in FSV (Field Status Variant) to maintain field status for G/L (General Ledger) accounts. It controls which field should suppress, display, optional and required.
33) What is short-end fiscal year?A short-end fiscal year results when you change from a normal fiscal year to a non-calendar fiscal year, or other way around. This type of change happens when an enterprise becomes part of a new co-corporate group.
34) What is an account group and where it is used?To control the data that needs to be entered at the time of the creation of a master record an account group is used. Account group exist for the definition of GL account, Customer Master and Vendor.
35) What is the purpose of “Document type” in SAP?The purpose of ” Document type” in SAP is
c) It is used for the reversal of entries
36) Is business area at company code level? 37) In SAP, Customer and Vendor code are stored at what level?The Vendor and Customer codes are stored at the client level. It means that by extending the company code view any company code can use the customer and vendor code.
38) How are tolerances for invoice verification defined?Tolerance determines whether the payable places matching or tax hold on the invoice. The following are the instances of tolerance can be defined for Logistic Invoice Verification.
d) Price variances
39) What is a country Chart of Accounts?Country Chart of Accounts contains G/L (General Ledger) accounts needed to meet the country’s legal requirements.
40) What is APP in SAP Fico?APP stands for ‘Automatic Payment Program’; it is a tool provided by SAP to companies to pay its vendors and customers. APP tools help to avoid any mistakes taken place in posting manually. Also, when number of employees is more in the company, payment through APP becomes more feasible.
41) In SAP FICO what are the terms of payment and where are they stored?Payment terms are created in the configuration and determine the payment due date for vendor/customer invoice.
They are stored on the customer or vendor master record and are pulled through onto the customer/vendor invoice postings. The due date can be changed on each individual invoice if required.
42) What are one-time vendors? 43) What are the standard stages of the SAP payment run?The following steps are the standard stages of the SAP payment run
d) Printing of payment forms ,example cheques
44) In Accounts Receivable, what is the difference between the ‘Residual Payment’ and ‘Part Payment’ methods of allocating cash?‘Residual payment’ and ‘Part payment’ are the two methods for allocating partial methods from customers. For example, an invoice for $100 is generated, customer has paid $70. Now this $70 will be off-set and leaving the remaining balance $30. With residual payment, the invoice is cleared for the full value of $100 and a new invoice is generated for the remaining balances $30.
45) What is “dunning” in SAP?‘Dunning’ is the process by which payment chasing letters are issued to customers. SAP can determine which customers should receive the letters and for which overdue items. Different letters can be printed in SAP depending on the overdue payment date, with a simple reminder. With the help of dunning level on the customer master, we can know which letter has been issued to the customer.
46) What is the purpose of the account type field in the GL (General Ledger) master record?At the end of the year, profit and loss accounts are cleared down to the retained earnings balance sheets account. The field contains an indicator which is linked to a specific GL (General Ledger) accounts to use in this clear down.
47) Explain what is recurring entries and why are they used?Recurring entries can eliminate the need for the manual posting of Accounting documents which do not change from month to month. For example, an expense document can be generated which can be scheduled for the last days of each month or whenever an individual wants it. Usually multiple recurring entries are created at one go and then processed all together as a batch month end using transaction.
48) What is a ‘Value Field’ in the CO-PA module?Value fields are number or value related fields in profitability analysis such as quantity, sales revenue, discount value etc.
49) What are the statistical internal orders? 50) For what purposes internal orders can be used?You can use internal orders for
d) Orders with Revenue: It display the cost controlling parts of Sales and Distribution, it does not affect the core business of the company
These interview questions will also help in your viva(orals)
You're reading Top 50 Sap Fico Interview Questions & Answers In 2023
Top 6 Microsoft Hdfs Interview Questions
Introduction
Microsoft Azure HDInsight(or Microsoft HDFS) is a cloud-based Hadoop Distributed File System version. A distributed file system runs on commodity hardware and manages massive data collections. It is a fully managed cloud-based environment for analyzing and processing enormous volumes of data. HDInsight works seamlessly with the Hadoop ecosystem, which includes technologies like MapReduce, Hive, Pig, and Spark. It is also compatible with Microsoft’s powerful data processing technologies like Azure Data Lake Storage and Azure Blob Storage.
Scalability is one of HDInsight’s most essential characteristics. Microsoft Azure HDInsight also has enterprise-level security features, including role-based access control, encryption, and network isolation. HDInsight integrates readily with Microsoft’s other cloud services, including Power BI, Azure Stream Analytics, and Azure Data Factory. Finally, it is a fully managed cloud-based service, which means Microsoft is responsible for the underlying infrastructure, maintenance, and upgrades.
Learning Objectives
We will review Microsoft HDFS and how it works in a significant data context.
Understanding how to utilize Azure HDInsight in the cloud to handle and analyze enormous volumes of data
We will review Hadoop tools such as MapReduce, Hive, and Spark and how they may be utilized with HDInsight.
You will also learn about the functions of different nodes in HDInsight.
This article was published as a part of the Data Science Blogathon.
Table of Contents Q1. What Exactly is HDInsight, and How is it Related to HDFS?Azure’s HDInsight is a fully managed cloud solution running significant data processing technologies like Apache Hadoop and Apache Spark. It’s a cloud-based Hadoop implementation for massive data processing and analysis in a distributed system. Hadoop is a freely available software framework for sharing enormous datasets among computing nodes. It plays a crucial role in the overall Hadoop infrastructure. It is a distributed file system that stores application data on inexpensive commodity servers in several locations, making it accessible at high speeds. HDFS’s master/slave architecture ensures that even the most massive datasets may be stored and managed without any loss of integrity or performance.
HDInsight’s distributed file system is HDFS. When users submit tasks to HDInsight, the data is dispersed automatically among the cluster nodes and saved in HDFS. HDInsight also includes other Hadoop ecosystem components such as MapReduce, Hive, Pig, and Spark for processing and analyzing data in HDFS. HDInsight is a cloud-based platform that enables customers to leverage the capabilities of Hadoop and its ecosystem products without requiring underlying infrastructure management. It uses HDFS as its file system to facilitate distributed data storage and processing.
Q2. How Does Microsoft Azure Data Lake Storage Gen2 Work with HDFS?Microsoft Azure Data Lake Storage Gen2 is a cloud-based storage solution with a hierarchical file system for storing and analyzing massive volumes of data. It is intended to interact with large data processing platforms like Hadoop and Spark and smoothly interfaces with HDFS. Azure Data Lake Storage Gen2 includes a Hadoop Compatible File System (HCFS) interface, allowing Hadoop and other big data processing tools to access data in Data Lake Storage Gen2 as if it were in HDFS. Customers may handle and analyze data stored in Data Lake Storage Gen2 using their existing Hadoop tools and applications.
Q3. Can You Explain the Role of NameNode and DataNode in HDFS?The NameNode and DataNode components of HDFS create a distributed storage and processing environment for massive datasets. Here is how they work:
NameNode: The NameNode serves as the HDFS cluster’s central coordinator and metadata store. It maintains information about file locations, hierarchy, and file and directory properties. The NameNode stores this information in memory and on disc, and it is in charge of managing access to HDFS data. When a client application needs to read or write data from HDFS, it first contacts the NameNode to retrieve the data’s location and other information.
DataNode: The DataNode is HDFS’s workhorse. It is responsible for storing the data blocks that make up the files in HDFS. Each DataNode manages storage for a subset of the data in the HDFS cluster and duplicates data to other DataNodes for redundancy and fault tolerance. When a client application needs to read or write data, it directly talks with the data nodes that hold the data blocks.
In summary, the NameNode and DataNode collaborate to produce a distributed file system capable of storing and processing massive datasets. The NameNode handles the file information, whereas the DataNodes contain the actual data blocks. To provide data redundancy, fault tolerance, and rapid data retrieval, the NameNode and DataNodes interact with one another.
Q4. How does HDFS ensure data reliability and fault tolerance?It is intended to offer fault-tolerant storage for massive datasets. It does this by duplicating data over several cluster nodes, detecting and recovering from faults, and maintaining data storage reliability and accuracy. HDFS ensures data reliability and fault tolerance in the following ways:
It stores data in blocks duplicated across several data nodes in the cluster. Each block is replicated three times by default, although this may be changed based on the application’s needs. Data replication over several nodes guarantees that data is available on other nodes even if one or more fails.
Failure detection and recovery: HDFS continually checks the health of the cluster’s data nodes. Whenever a DataNode fails or becomes unresponsive, the NameNode notices the failure and duplicates the failed node’s data to other nodes in the cluster. The NameNode then updates the metadata to reflect the new locations of the replicated data blocks.
Data consistency: Using a write-once-read-many (WORM) architecture, HDFS ensures that data is saved reliably and precisely. Data that has been written to HDFS cannot be changed. This guarantees that data consistency is maintained even when numerous clients access the same data simultaneously.
Block placement: To guarantee that data blocks are placed on distinct racks in the cluster, HDFS employs a rack-aware placement strategy. This ensures that even if an entire frame fails, the data is still accessible on the cluster’s other racks.
Overall, by duplicating data over several nodes, detecting and recovering from failures, assuring data consistency, and employing a rack-aware placement policy to reduce data loss due to rack failures, HDFS provides a dependable and fault-tolerant storage solution for massive datasets.
Q5. Can You Describe What the NameNode and DataNode Roles are in HDFS?HDFS is a distributed file system that stores and handles massive datasets on commodity hardware in a cluster. As explained in the preceding question, the HDFS architecture comprises two key components: the NameNode and the chúng tôi provide data dependability and fault tolerance, the NameNode and DataNodes interact. When a client needs to read or write data from HDFS, it talks with the NameNode to find the data blocks. The client then discusses with the DataNodes directly to read or write data blocks.
MapReduce, a distributed data processing framework, is frequently combined with HDFS. MapReduce is intended to handle big datasets by dividing them into smaller pieces, spreading the processing of those chunks across a cluster of processors, and aggregating the results. Here is how MapReduce interacts with HDFS:
The input data is saved in HDFS. MapReduce receives input data from HDFS and divides it into smaller chunks called input splits.
The input splits are distributed across the cluster and assigned to specific Map jobs using MapReduce. Each Map job handles a single input split and produces intermediate key-value pairs.
The intermediate key-value pairs are then sorted and shuffled before being sent to the Reduce jobs. Each Reduce job collects intermediate input and generates the final result.
The final result is saved to HDFS.
Q6.What makes HDFS different from other file systems, and what are the benefits of using HDFS in a huge data environment?
Scalability: Conventional file systems are not built to manage the massive amounts of data that are frequent in big data situations. It is designed to grow horizontally, which means it can accommodate petabytes or even exabytes of data storage and processing by distributing the data over a cluster of commodity hardware.
Fault tolerance: It is built to be fault-tolerant. It can endure the failure of individual nodes in the cluster by duplicating data across several nodes in the cluster. It also has techniques for automatically detecting and recovering from node failures.
It is meant to have a high throughput for both reading and writing data. While working with huge files, HDFS may achieve fast read and write rates since it is specialized for massive data transfers.
Data locality: It is designed to maximize data locality, which means that data is stored and processed on the same cluster nodes wherever feasible. Reducing data transit over the network minimizes network traffic and increases performance.
Cost-effectiveness: Because it is designed to run on commodity hardware, it may be implemented on low-cost servers or in the cloud. As a result, it provides a low-cost option for storing and processing massive volumes of data.
Overall, the benefits of employing HDFS in a big data context are scalability, fault tolerance, high throughput, data localization, and cost-effectiveness. By exploiting these features, organizations may store, manage, and analyze massive datasets more efficiently and cost-effectively than traditional file systems.
ConclusionIn this article, we examined different features of Microsoft HDFS, including its introduction, architecture, working with Azure Data Lake Storage Gen2, and its function in MapReduce. We also went through common interview questions in both Amazon and Microsoft setups. It is important to big data applications because it provides scalable and fault-tolerant storage for massive datasets. Understanding design and operation is essential for data engineers and developers working with big data solutions.
Here are some key takeaway points:
It is a distributed file system that stores and handles huge datasets on commodity hardware in a cluster.
The NameNode and the DataNode are the two fundamental components of HDFS. The NameNode keeps the file system’s information, whereas the DataNode stores the actual data blocks that comprise the files.
It is built to be extremely fault-tolerant and to provide dependable storage for big data applications. It can accommodate petabytes or even exabytes of data storage and processing by spreading the data across a cluster of commodity computers.
MapReduce, a distributed data processing framework, may be used in combination with HDFS. MapReduce divides huge datasets into smaller bits and distributes their processing over a cluster of processors.
Lastly, Microsoft provides HDInsight, a cloud-based Hadoop distribution containing HDFS, MapReduce, and other components.
The media shown in this article is not owned by Analytics Vidhya and is used at the Author’s discretion.
Related
Top 70 Web Services Interview Questions (2023)
Here are Web Services interview questions and answers for fresher as well experienced candidates to get their dream job.
1) Define Web Service?A web service is a kind of software that is accessible on the Internet. It makes use of the XML messaging system and offers an easy to understand, interface for the end users.
2) What is new in this field for past few years?👉 Free PDF Download: Web Services Interview Questions & Answers
3) Give me an example of real web service?One example of web services is IBM Web Services browser. You can get it from IBM Alphaworks site. This browser shows various demos related to web services. Basically web services can be used with the help of SOAP, WSDL, and UDDI . All these, provide a plug-and-play interface for using web services such as stock-quote service, a traffic-report service, weather service etc.
4) How you define web service protocol stack?
It is basically set of various protocols that can be used to explore and execute web services. The entire stack has four layers i.e. Service Transport, XML Messaging, Service Description and Service Discovery.
5) Can you define each of these layers of protocol stack?The Service Transport layer transfer messages between different applications, such as HTTP, SMTP, FTP, and Blocks Extensible Exchange Protocol (BEEP). The XML Messaging layer encodes messages in XML format so that messages can be understood at each end, such as XML-RPC and SOAP. The Service Description layer describes the user interface to a web service, such as WSDL. The Service Discovery layer centralizes services to a common registry and offer simple publish functionality, such as UDDI.
6) Define XML – RPC?It is a protocol that makes use of XML messages to do Remote Procedure Calls.
7) Define SOAP?SOAP is an XML based protocol to transfer between computers.
8) Define WSDL?It means Web Services Description Language. It is basically the service description layer in the web service protocol stock. The Service Description layer describes the user interface to a web service.
9) What kind of security is needed for web services?The security level for web services should be more than that of what we say Secure Socket Layer (SSL). This level of security can be only achieved from Entrust Secure Transaction Platform. Web services need this level of security to ensure reliable transactions and secure confidential information.
10) Do you have any idea about foundation security services?As implies from its name, these services are the foundation or basics of integration, authentication, authorization, digital signatures and encryption processes.
11) Define Entrust Identification Service?Entrust Identification Service comes from the Entrust Security Transaction Platform. This platform allows companies to control the identities that are trusted to perform transactions for Web services transactions.
12) What UDDI means?UDDI stands for Universal, Description, Discovery, and Integration. It is the discovery layer in the web services protocol stack.
13) Define Entrust Entitlements Service?This service verifies entities that attempt to access a web service. For Example, the authentication service, the Entitlements Service ensures security in business operations.
14) Define Entrust Privacy Service?As its name implies, it deals with security and confidentiality. This service encrypts data to ensure that only concerned parties can access the data.
15) What do you mean by PKI?It means Public-Key Infrastructure.
16) What tools are used to test a web service?I have used SoapUI for SOAP WS and Firefox poster plugin for RESTFul Services.
17) Differentiate between a SOA and a Web service?SOA is a design and architecture to implement other services. SOA can be easily implemented using various protocols such as HTTP, HTTPS, JMS, SMTP, RMI, IIOP, RPC etc. While Web service, itself is an implemented technology. In fact one can implement SOA using the web service.
18) Discuss various approaches to develop SOAP based web service?We can develop SOAP based web service with two different types of approaches such as contract-first and contract-last. In the first approach, the contract is defined first and then the classes are derived from the contract while in the later one, the classes are defined first and then the contract is derived from these classes.
19) If you have to choose one approach, then what will be your choice?In my point of view, the first approach that is the contract-first approach is more feasible as compared to the second one but still it depends on other factors too.
20) Is there any special application required to access web service?No, you don’t need to install any special application to access web service. You can access web service from any application that supports XML based object request and response.
21) Can you name few free and commercial implementations for web services?The implementations I know are Apache SOAP, JAX-WS Reference Implementation, JAX-RS Reference Implementation, Metro, Apache CXF, chúng tôi and Java 6.
22) Name browser that allows access to web service?JavaScript XmlHttpRequest object is required to access web service via browsers. The browsers that support this object are Internet Explorer, Safari and Mozilla-based browsers like FireFox.
23) What is REST?REST stands for Representational State Transfer. REST itself is not a standard, while it uses various standards such as HTTP, URL, XML/HTML/GIF/JPEG (Resource Representations) and text/xml, text/html, image/gif, image/jpeg, etc (MIME Types).
24) How one can provide API to users?To provide an API to the users, one can easily do this with an “open table”. All you need to do is to write open table which is basically an XML schema that point to a web service.
25) Name the various communication channels in web service?Web service is integrated with three protocols such as HTTP/POST, HTTP/GET, and SOAP. It provides three different communication channels to clients. Client can choose any communication method as per requirements.
26) How can you document web service?Web services are contemplated as self-documenting because they provide entire information regarding the available methods and parameters used for XML based standard, known as WSDL. One can also provide more information to explain web services via their own WebService and WebMethod attributes.
27) What are the situations, when we need chúng tôi web services? 28) What are distributed technologies?The increasing ratio of distributed applications has raised demand for distributed technologies. It allows segmenting of application units and transferring them to different computers on different networks.
29) Differentiate between web services, CORBA and DCOM?Web services transfer/receive messages to/from application respectively, via HTTP protocol. It uses XML to encode data.
CORBA and DCOM transfer/receive messages to/from application respectively, via non-standard protocols such as IIOP and RPC.
30) Can you tell few benefits of web services? 31) Can you name some standards used in web services?The standards used in web services are WSDL (used to create interface definition), SOAP (used to structure data), HTTP (communication channels), DISCO (used to create discovery documents) and UDDI (used to create business registries).
32) Explain in brief, what DISCO is?DISCO means discovery. It groups the list of interrelated web services. The organization that provides web services, issues a DISCO file on its server and that file contains the links of all the provided web services. This standard is good when client knows the company already. Also it can be used within a local network as well.
33) Explain in brief, what UDDI is?UDDI (Universal Description, Discovery, and Integration) provides consolidated directory for web services on the internet. Clients use UDDI to find web services as per their business needs. It basically hosts the web services from various companies. In order to share web services, you need to publish it in UDDI.
34) Explain the .NET web services supported data types?.Net web services uses XML-based standards to transfer/receive information. Thus, .NET web services can only works with data types known by XML schema standard. Like FileSteam, Eventlog etc. are not recognized by the XML schema standards and hence, not supported in web services.
35) How a .NET web service is tested?ASP.NET uses a test page routinely, when one calls for the URL of .asmx file in any browser. This page shows complete information regarding web services.
36) How a .NET web service is consumed?Since we know that web services are constructed on XML standards. Therefore, clients need to have complete understanding of XML-based messages to interchange messages. Clients can communicate with web services through .NET framework that offers proxy mechanisms. These proxy mechanisms have detailed information regarding data sharing within web services that can be easily used by the clients.
37) Can you name the two Microsoft solutions for distributed applications?The two Microsoft solutions for distributed applications are .NET Web Services and .NET Remoting.
38) Differentiate between .NET Web Services and .NET Remoting?As far as protocol is concerned, .NET Web Service uses HTTP, while, .NET Remoting uses any protocol i.e. TCP/HTTP/SMTP. When it comes to performance, .NET Remoting is comparatively, faster chúng tôi Web Service. Also, as .NET Web Services are hosted via IIS, therefore, it is far more reliable than the .NET Remoting.
39) Name the components to be published while deploying a Web Service?The components that need to be published during a web service deployment are Web Application Directory, chúng tôi File, Webservice.Disco File, Web.Config File and Bin Directory.
40) What are the steps performed by the client to access a web service?First of all a web reference to the web service is created by the client in his application. Then a proxy class is generated. After that an object of the proxy class is created and at last, the web service is accessed via that proxy object.
41) How web services are implemented in .NET?To implement web services in .NET, HTTP handlers are used that interrupt requests to .asmx files.
Response Caching is useless or incompetent when method accepts extensive amount of values because caching means to store lot of information. Also, if the method depends on external source of information, and that are not provided within the parameters then such methods are bypassed.
43) What is the alternate solution to Response Caching?One can use Data Caching (System.Web.Caching.Cach) instead of Response Caching.
44) Brief few drawbacks of using GET and POST methods to communicate with the web service?These methods are less secure and inhibit users to pass structures and objects as arguments. Also, it doesn’t allow users to pass ByRef arguments.
45) How can one access a class as a web service?To access a class as a web service, one should inherit the class from the System.Web.Services.WebService class and qualify the class with the WebService attribute.
46) How can one access the web service class method via internet?To access web service class method via internet, one should qualify a method with the WebMethod attribute.
47) How a SOAP message is structured?A SOAP message is consists of SOAP Envelope, SOAP Headers, and SOAP Body.
48) Can you name different kinds of web services?There are two types of web services in total i.e. SOAP based web service and RESTful web service.
This question is already mentioned earlier.
49) What’s different in RESTful web services?The RESTful web services contains no contract or WSDL file.
50) Give me few reasons to use RESTful web service?The RESTFul web services are simple to implement and test. It supports various data formats such as XML, JSON etc.
51) Explain what is JAVA web services? What are the methods to create web services?Java webservices is developed to build and deploy basic web service on JAVA platform.
To create a web services, there are two approaches that are adopted
Top-down approach
Top-up approach
52) Explain what is JAXP?JAXP is a JAVA API for XML processing that enables application to write, read, manipulate and transform XML data. Similarly, to perform other various function there are other Java API’s as well like JAX-RPC, JAXM, JAXR, JAXB, etc.
53) Mention the JAXB binding framework?JAXB binding framework is available in three Java Packages
xml.bind: This package defines abstract classes and interfaces that are used directly with content classes
xml.bind.util: This package contains utility classes that may be availed by client applications to manage marshalling, unmarshalling and validation events
xml.bind.helper: This helper package gives partial implementations for some of the chúng tôi interfaces. These APIs are not to be directly used by applications using JAXB architecture
54) Give a simple example of how XML document can be Marshal and Unmarshal in JAVA framework?Marshalling is the process of converting XML document into Java readable form while UnMarshalling is the reverse process of Marshalling. Let see how Java unmarshals an XML document and then marshals it back
JAXBContext jc= JAXBContext.newInstance ("com.acme.foo"); Unmarshaller u = jc.createUnmarshaller () ; FooObject fooObj= (FooObject)u.unmarshal (new File ("foo.xml") ); Marshaller m = jc.createMarshaller (); m.marshal (fooObj, System.out); 55) Explain what does Marshaller do if jaxb.encoding property is not declared?By default, the Marshaller will use “UTF-8” if jaxb.encoding property is not declared.
56) Mention what are the types of validation can a JAXB client can perform?There are two types of JAXB client validation that a JAXB can perform
Unmarshal Time Validation
On-Demand Validation
57) Mention what are the three ways to handle the event encountered during the marshal, unmarshal and validate operations?
Using the default event handler
Register and Implement a custom event handler
Use the ValidationEventCollector utility
58) Explain where does JAXB compiler is located? 59) In what cases do you need to customize the default binding?In some cases, you are required to customize the default binding like
Creating API documentation for the schema derived JAXB packages, classes, methods and constants
Giving semantically meaningful customized names for cases that the default XML name-to-Java identifier mapping cannot handle automatically
Overriding default binding- like specifying that a model group should be attached to a class rather than a list
60) Explain what is Inline Customization? 61) Explain what is XML signature?XML can be used to sign any arbitrary data whether it is a binary or XML. The data is recognized via URIs in one or more reference elements. It is described in one or more forms, like detached, enveloping or enveloped.
62) Explain what is Stax?Stax stands for Streaming API for XML; it is an API to read and write XML documents, originating from the JAVA programming language.
63) Mention what are the usual XML APIs?The usual XML APIs includes
DOM based or Tree based APIs: The whole document is read into memory as a tree structure for random availability by calling application
Event based APIs: The application registers to get events as entities are encountered within the source document
64) Explain what is Push parsing and Pull parsing?
Pull Parsing: Streaming pull parsing is referred to a programming model in which a client application calls methods on an XML parsing library, when it needed to communicate with an XML infoset- which means the client will only gets XML data when it is asked for
Push Parsing: In Push Parsing, the parser pushes parsing events or XML data to the application. In push model, the parser got the hold over the parsing process and the parser calls the implemented handler methods.
65) Explain on which technology does XWS security is based on? List out the options that XWS security provides for securing JAX-RPC applications?XWS security is based on securing web services build on JAX-RPC and on stand-alone application based on SAAJ. For securing JAX-RPC application, options that XWS security provides are
XML digital signature
XML encryption
Username token verification
XWS security framework APIs
66) List out the six packages available in XML Digital signature API?Digital signature API is
xml.crypto
xml.crypto.dsig
xml.crypto.dsig.keyinfo
xml.crypto.dsig.spec
xml.crypto.dom
xml.crypto.dsig.dom
67) Explain what is JAXR?JAXR is the JAVA programming APIs for Java platform application to access and programmatically interact with various kinds of meta-data registries.
68) Explain what does the JAXR architecture consist of?JAXR architecture is consists of a JAXR client and JAXR provider.
JAXR client: It is a client program which uses the JAXR API to use a registry through a JAXR provider
JAXR provider: It is an implementation of the JAXR API that provide access to a particular registry provider or to a class of registry providers that are built on a common speicifications.
69) Explain what is JAXM messaging models?There are two types of messaging models for JAXM synchronous and asynchronous
Synchronous messaging model: In such type of model, client directly communicates with the source. In this, the client will send the request and waits.
Asynchronous messaging model: In this model, client directs the message to the messaging provider and returns back. Messaging provider then executes the routing of the message to the end source.
70) Explain what is UDDI, DISCO and WSDL?
UDDI: It means Universal Description, Discovery and I It is the directory that is used to publish and discover public web services
DISCO: It is commonly known as discovery. It clubs common services together and exposes schemas document of the web services
WSDL: It stands for web service description language (WSDL). It is used to describe web services. The description includes URL of web services, properties and methods supported by web services, data type it supports and protocol detail it supports
These interview questions will also help in your viva(orals)
Top 5 Interview Questions On Cloud Computing
This article was published as a part of the Data Science Blogathon.
IntroductionCloud computing is an internet-based emerging computing paradigm that provides a way to deliver computing resources. These resources include databases, applications, analytics, computing, servers, storage, networking, development, and intelligence. Cloud Computing provides automation and standardization to make computing resources easier to use and offers pay-as-you-go services that help you reduce your operating costs, which in turn helps you execute infrastructure efficiently.
In this blog, I discussed five interview-winning questions that will help you to set a pace for cloud computing and ace your upcoming cloud interview!
Q1:- What are the Different Cloud Delivery Models?Ans:- Models which are used to represent the computing environments are termed cloud delivery models. There are mainly three types of cloud delivery models present in the market, which includes SaaS, IaaS, and PaaS. Every model has a unique set of benefits that makes it different from others in terms of traits and usages.
Let’s go deeper with each one of them!
Software as a Service (SaaS): Software as a Service (SaaS) is a service delivery paradigm that is highly related to Application Service providers (ASP) and on-demand computing software delivery models. It provides a cloud platform where a customer’s application is created and hosted by a third-party provider in a multi-tenant model. SaaS enables the usage of those applications over the internet, and no additional installation is needed.
Some common examples of SaaS applications used for business technologies are email, Customer relationship management (CRM), sales management, human resource management (HRM), financial management, billing, and collaboration.
Infrastructure as a Service (IaaS): Infrastructure as a Service (IaaS) is one of the three main categories of cloud computing services that provide physical and virtual computing resources over the internet. IaaS enables firms to access the hardware resource without even purchasing them. Infrastructures provided by IaaS include the operating system, database storage, networking, and many other utility software elements based on demand.
Platform as a Service (PaaS): Platform as a Service (PaaS) is an important category of cloud computing services that provides a consistent way to organizations for creating and deploying applications on a cloud or on-premises environment. This layer fully depends upon the Infrastructure model. It combines that with an abstracted set of middleware services to provide customers with a platform that allows them to develop, run, and manage applications with zero complexity of building or maintaining the infrastructure.
Q2- Explain the Hybrid, Public, and Private Cloud. Also, Compare Them in Terms of Safety.Ans:- There are three major deployment models of the cloud, which include Public, Private, and Hybrid Cloud. Let’s explore each cloud type one by one!
Public cloud: Public Clouds are nothing but the set of hardware, software, networking, storage, services, applications, and other auxiliary infrastructure owned and operated by third-party providers for the use of individuals or other companies. To ensure data security, third-party providers hide the details of the underlying infrastructure with the help of highly scalable data centers. These clouds are open for usage and deployment by any person. We can share the same hardware with multiple partners and access the services via web browsers. Public clouds are the best choice when the volume of data is high and demands fluctuate. Examples:- Google, Amazon, and Microsoft Azure.
Private cloud: Private Clouds are nothing but the set of hardware, software, networking, storage, services, applications, and other auxiliary infrastructure owned and operated by a firm exclusively for the use of its customers, partners, or employees. A private cloud is solely used by a single organization on its own private network. Most IT industries use private clouds to ensure their organization’s and customers’ privacy and keep their networks away from public clouds. The private cloud is not open for public consumption; that’s why its usage in government organizations is expected. Private clouds are the best choice when the usage patterns are predictable, and users are predefined.
Hybrid cloud: Private Clouds are nothing but the combination of public clouds and private clouds. A hybrid cloud environment combines on-premises computers, storage, and data to increase cloud demand. This cloud combines the features and functionalities of both clouds and applies the most robust approach to implement cloud architecture. A hybrid cloud allows industries to create their separate cloud and permits them as well to pass the control over to any other organization or individual.
Whenever we choose any technology, the major concern of any organization is the safety/security of their data. Let’s compare!
Public cloud:- These clouds have a huge volume of customers and numerous access points so they have a wider variety of security threats. To enable data safety, it usually splits the security responsibilities and assigns the workload security to the tenant and infrastructural security to the provider.
Private Clouds:- Private clouds are comparatively more secure than public clouds as they run behind the user’s firewall, but it only depends on an organization’s internal security.
Q3:- Name Some of the Popular Cloud Computing Services.
Ans:- The usage of Cloud computing has been increasing gradually as it is improving the ultimate performance of businesses. With the increase in demand for cloud technology, the number of cloud service provider and platforms are also increasing drastically. Some of the well-known players are Amazon Web Services(AWS), Windows Azure, IBM Cloud, Oracle Cloud, etc.
Sometimes it becomes difficult to choose a suitable cloud computing service for your business as numerous providers compete in the marking. The only thing you need to focus on while choosing a computing service is what you need the service to do. When you are crystal clear with your business model, you can choose the best service that matches your requirements’ features and practical requirements. Below are the majorly used large cloud providers:
Hostinger
Google BigTable
Alibaba Cloud
Amazon SimpleDB
Cloud-based SQL
Q4:- Describe the Security Aspects of Cloud Computing.Ans:- Cloud is the most trending technology, enhancing the platform quality and improving the data delivery speed. But with the movement of data from one platform to another, the major concern of every giant is security. Multiple security levels must be considered while talking about cloud environments:
Identity management: This level of security ensures that authorized users must use the hardware component or application service.
Access Control: This level provides the application services permission to customers so that firms have control and access over other users connected with the same cloud environment. A user must have the authorization to manage the access of another user joining the environment.
Authorization and Authentication: It only permits people authenticated and authorized to change or access the application and data.
Q5:- Explain the Transition From Traditional On-premise Computing to Cloud Computing.Ans:- Cloud Computing proves a big transition from traditional On-premise Computing for many industries that consider their data as a critical element. Cloud computing aims to enhance the ultimate performance of businesses in various aspects, including cost, performance, security, speed, and productivity. Let’s discuss the major reasons for this transition!
Cost:- Cost is considered one of the most debatable elements when we compare cloud with traditional computing. Usually, people consider the cloud as a costly technology but there are scenarios where the cloud is proven as a cheaper one. When the project demands supercomputers, numerous CPUs, etc., cloud computing shows its value by eliminating the cost of buying software, hardware, racks of servers, and the arrangement of data centers.
Cloud computing eliminates the need for an IT team for infrastructure management and reduces the electricity consumption for power and cooling.
Speed:- Cloud computing serves data much faster than traditional computing as it does not have to search multiple data centers and requires no hardware shifting. It also offers on-demand and self-services, which allows the organizations to work accordingly. It provides great flexibility to organizations by delivering their humorous data in minutes/seconds, increasing their productivity.
Productivity:- When we talk about productivity, the first thing that hits our mind is maintenance. Traditional computing requires regular system health checks and upgrades according to business requirements. This process of updating takes a lot of time and even we lost all the previously configured settings after a successful upgradation. But when we use cloud computing, we don’t have to bother about the upgradation or maintenance as everything is automated here. This automation helps IT hubs to meet their business goals and increase productivity.
Performance: System performance is always critical as it depends upon the hardware, software, and servers. Unlike on-premise computing, cloud computing never compromises the system performance as the upgrades are less-expensive here. At the cloud end, we can use the GPUs whenever required, and we only have to pay for the time of use. This stops organizations from poor performance and frequent interruptions.
ConclusionThis blog covers some of the frequently asked Cloud Computing interview questions that could be asked in data science interviews. Using these interview questions as a reference, you can better understand the concept of the cloud and start formulating effective answers for upcoming interviews. The major key takeaways from the discussed cloud interview questions are:-
Cloud computing is an e-computing paradigm that offers automation and standardization to make computing resources easier.
We discussed the three different cloud delivery models, including SaaS, IaaS, and PaaS, and also discussed when to use which model.
We understand the public, private, and hybrid clouds with their safety measures.
We have also discussed some popular cloud service providers, and I can suggest Amazon web’s cloud service for the usage of any project, as it offers different types of cloud computing that can fit your business easily.
At last, we discussed some common reasons for transitioning from on-premise computing to the cloud.
The media shown in this article is not owned by Analytics Vidhya and is used at the Author’s discretion.
Related
Top 81 Automation Anywhere Interview Questions And Answers
Here are Automation Anywhere Interview Questions for fresher as well as experienced candidates to get their dream job.
1) What is Automation?Automation is a technique of making devices, a process, or a system to operate automatically.
2) What is Automation Anywhere?Automation Anywhere is one of the popular RPA vendors offering powerful & user-friendly RPA capabilities to automate any complex tasks.
It is one of the revolutionary technology that changes the way the enterprise operates. This tool combines conventional RPA with intellectual elements like natural language understanding and reading any unstructured data.
3) What is BOT insights?BOT insights is a tool that simply shows statistic and display graphs to analyse the performance of every bot in the system. Here, you can also calculate the time you have saved because of the automation process.
4) Specify the important factors needed for the evaluation of the scripting standard of Automation testing.Important factors needed for the evaluation of the scripting standard of Automation testing are: There should be optimized utilization of system wherever needed, automation testing script should have a uniform naming tradition, administration, and error handling module.
5) What are the features of Automation Anywhere?
Features of Automation Anywhere are:
Automation Intelligence for business and IT tasks
Uses SMART Automation Technology
Rapidly Automates complex and complicated tasks
Distribute tasks to multiple computers
Automation Anywhere offers scriptless Automation
Auto-login runs scheduled tasks on anytime, even when the computer is locked.
6) Name Subversion (SVN) used in Automation anywhere and maintaining a repositorySubversion (SVN) used in Automation anywhere and maintaining a repository is Apache subversion.
7) List browsers supported by Automation anywhereBrowsers supported by Automation anywhere are:
CHROME 49 and above
FIREFOX 45,46,47
IE 10 & 11
8) Mention commands used for error handling in Automation Anywhere?Commands used for error handling in Automation Anywhere are:
1) Begin Error Handling and
2) End Error Handling.
9) What are the predefined variables?The predefined variables are system variables which are provided by Automation Anywhere in order to automate any task.
10) What is the use of the OCR command for Image Recognition?OCR command is used to:
Specify an image.
Select the OCR Engine and set a threshold amount to determine its accuracy.
Assign the value of the extracted text in a variable.
11) What is object cloning in Automation anywhere?The object cloning command is used to recognized objects and a variety of their properties, including type, name, value, and path.
12) How to compare two rows in Microsoft Excel?Comparison can be done between two rows in Excel by adding a unique serial no or ID to it.
13) What is the difference between the set text and append text?The set text will insert the latest data by removing old data, whereas while append text will only insert data, and it will not remove old data.
14) Why triggers used in Automation Anywhere?Triggers are used in Automation Anywhere in order to launch the manager, to add delete, or edit triggers, or to enable or disable triggers.
15) What do you mean by QTP?QTP stands for Quick test professional and is an Automation tool that is considered in test environments.
16) Name things which can be automatedThings that can be automated are: Automation behind GUI, build deployment, smoke sanity test suite, and test data creation.
17) List different recorders of Automation AnywhereDifferent recorders of Automation Anywhere are 1) easy recorder, 2) object recorder, and 3) web recorder.
18) Mention app integration commands in Automation AnywhereApp integration commands in Automation Anywhere are: browser, Java Applet, and dos command prompt.
19) What is a workflow designer?The workflow designer is helpful in building a process flow diagram with a graphical environment. It can be used to build automated tasks in the program.
20) Why String Operation Commands are used in Automation Anywhere?String operation commands in Automation Anywhere are used to perform various actions like:
Length
Trim
Join
Compare
Lower Case
Find
Before/After
Sub-string
Replace
Split
Reverse
21) Mention subcommands that are provided by Terminal EmulatorSubcommands that are provided by Terminal Emulator are:
Send Text/ Get Text
Set Field/ Get Field
Get all fields
Control
Connect/Disconnect
Wait
22) What Enterprise Control Room does?The Enterprise Control Room provides the main dashboards from which all of the automation projects can be managed. The Enterprise Control Room centralizes the control, security, and collaboration.
23) What are the types of Bots in Automation Anywhere?There are basically three types of Bots in Automation Anywhere:
Meta Bots: Meta bots are the automation building blocks. It is designed in such a way that with application updates or changes, you need to make minimal edits to the bot. Changes automatically apply to any process utilizing that bot.
24) What is the role of Bot Runner?Bot Runner is a kind of machine that is used to run Bots. There are possible chances to run Bots parallelly. A run license is needed in order to run any Bot. In case any failure occurs in the middle of the process, then it is returned to the control room.
25) List applications where the Automation Anywhere is usedThe application where Automation anywhere is used are:
Accounting: Invoice processing, reporting, auditing, etc.
HR: Automating tasks in PeopleSoft. Email notifications, populating.
Operations/IT: Creating accounts, software set-up, batch processing, system integrations, etc.
Sales: Creating and printing invoices, add, modify, and removing customer data into CRM.
Marketing: Creating lead generation reports and monitoring social sentiment.
Manufacturing: Inventory management. Excel automation. ERP integration.
26) Explain the types of recorders in Automation AnywhereTypes of recorders in Automation Anywhere are:
Smart Recorder: It is a feasible approach for building tasks and applicable for both desktop and web applications.
Web Recorder: This recorder is applicable for performing tasks that require repetitive actions and can be implemented for web-based applications.
27) Name two tools that can be used for Automation anywhere testingTools that can be used for Automation anywhere testing are: 1) Rational Robot and 2) QTP.
28) What are the types of a framework that are used in Automation Anywhere software?There are four important frameworks that are used in Automation Anywhere software:
1) keyword driven automation framework.
2) data-driven automation framework.
3) hybrid automation framework.
4) modular automation framework.
29) Why wait command is good?Command wait is good because it provides two options: 1) Wait for window and 2) Wait for screen change.
30) How can time stamps be created for Automation Anywhere task?Stamps can be created by using system variables like a year, day, hour, month, minute, and second.
31) List the commands used in Automation AnywhereCommands used for Automation Anywhere are:
Object cloning
Logfile
DB commands
PDF integration
Message box
Email commands
Keystroke
Excel commands
32) How to add/remove Clients in Control Room?Clients can be added to or removed from Control Room by going to user management tab in Automation Anywhere Control Room. Users can either deactivate or deactivate any client by selecting the proper option under actions.
33) How to do logs in Automation Anywhere?There is a command called LOGTOFILE to print the logs to an external file of your choice, either by appending or replacing it with a timestamp.
34) What is app integration in Automation Anywhere?App Integration provides an option to work with applications like DOS, Browsers, Java Applet, UNIX shell, and more.
35) List looping commands available in Automation AnywhereLooping commands available in Automation Anywhere are:
Start loop
End loop
Exit loop
Continue loop
36) Mention various types of variables available in Task editorVarious types of variables available in Task editor are:
Value
Array
Random
List
37) List various options available for error handlingVarious options available for error handling are:
Err number
Err description
Continue/exit task
Take snapshot
Log
Send email
Variable assignment
Run another task
38) How to lock, shutdown, and restart machine using Automation Anywhere?Command SYSTEM, which is available in sub-menu, can be used to lock, shutdown, and restart machines using Automation Anywhere.
39) What is the use of a variable in Automation Anywhere?Variables can help programmers to fetch online data to transform between two or more applications like MS Excel. Automation Anywhere is designed with different types of variables that can be defined for each task.
40) Name the command that is used to hold BOT extension 41) What are the primary aim of using Automation Anywhere Control Room?The primary aim of using Automation Anywhere Control Room are:
Server settings
Registering a client
Uploading tasks
42) How to create a timestamp for particular tasks using Automation Anywhere?The timestamp for particular tasks using Automation Anywhere can be created using variables like:
Year
Month
Day
Hour
Minute
Second
Date
43) Mention the difference between Email Automation Command and Send Email command?Email Automation command is used to manage the automatically manage incoming mails, extracting attachments to a particular folder, etc. Send email commands are used to trigger the emails and include the attachments and format it in HTML.
44) Define hotkey and how to assign a hotkey to a task? 45) What is a modular testing framework?Modular testing framework is a tester that divides the whole application into small modules and creates test scripts individually. These scripts are combined to make larger test scripts by using a master script to achieve the goal.
46) What is a trigger?The Trigger enables a task to run automatically for a particular event that occurs on your PC. For example, a trigger can be used when any new window opens, or a specific file is created.
47) What is the command to launch any website?The command to launch any website is: Launch Website Activity.
48) What is Bot Creators?Bot creators are a command that is used to create a bot.
49) How to read CSV files using Automation Anywhere?Perform the following steps to read CSV file using Automation Anywhere:
Step 1) Open CSV file or text file by giving their location using OPEN PROGRAM/FILE command.
Step 2) Use READ CSV/ TEXT FILE command in order to read a CSV file.
50) How to read PDF using Automation Anywhere?PDF Integration is a command that can be used to read PDF files of single or multiple pages, merge documents, extract values, and more.
51) What is Automation Anywhere Credential Vault?Automation Anywhere credential vault provides a facility to store the password in a secure way and use it at run time in BOTS. These variables easily accessed through F2 or variable for a password field.
52) How to assign new permissions to users?New permission can be assigned by going to the security tab to set the permission of users.
53) Explain actions offered by Automation Anywhere to handle errorsActions provided by Automation Anywhere to handle errors are:
Run task: Used to run a task when the current task has an error.
Variable assignment: It is used to identify a value to be assigned and set tasks.
Send an email: It is used to send an email when an error occurs.
Log data into a file: It logs any error into a file.
Take snapshot: You can take a screenshot of any error.
54) What is Image Recognition?Image Recognition is a feature of Automation Anywhere Enterprise. It allows the recognition and comparison of images from the window or file.
55) What is the use of wild card characters?Wild character in Automation Anywhere is represented as “*.” It is used for dynamic windows.
56) How to call a Bot inside a Bot?There is a command task to open another task BOT inside other BOTS. Meta BOTS can be used by dragging and dropping into a task editor. IQ BOTS can also be used by suing IQ BOTS command.
57) What are the types of licenses in Automation Anywhere?Two types of licenses in Automation Anywhere are:
Developer license
Run time
58) What are the crucial factors that should be taken care of while planning Automation anywhere?
All the applications used in the process can be automated using Automation Anywhere or not.
Whether the application/ process needs manual interventions?
Automation scripts taking more time than manual work?
Type of work environment like VM/Citrix
Type of OS Windows/Linux/Mac OS
59) What is the difference between Automation Anywhere Development and run-time client?
Development client is Task editor where we can edit and modify or run the tasks
Run time client is a task editor where a developer can run existing BOTS/tasks.
60) What kind of Scripts Automation Anywhere supports?Automation Anywhere supports VBScript and Jscript.
61) What all OCR engines supported by Automation Anywhere?OCR engines supported by Automation Anywhere are:
TOCR: Tesseract OCR
MODI: Microsoft Object Document Imaging
62) How to extract tables from PDF?A table from PDF can be extracted using Manage Windows controls.
63) Which system variable format can be modified?System variable can be modified is Date.
64) What is SnapPoint in Automation Anywhere? 65) How to pass the variables from one task to another?Passing the variables from one task to another can be done by mapping the variable when calling that task.
Eliminates the element of the human error
Increases transaction speed and allows to save time and costs
Quick Time to Value, Non-intrusive
It is useful to automate data transfers and import or export data between files or applications.
Scale from Desktop to Data Center
67) What are the steps involved in Automation Anywhere Process?Steps involved in Automation Anywhere Process are:
Step 1) Select the tool
Step 2) Define the scope of the Automation, followed by measures like planning.
Step 3) Test and execute the application.
Step 4) Maintain application
68) How does the Client communicate with the Server? 69) Name some software tools for testing Automation AnywhereSome of the essential automation testing tools are QTP, SoapUI, Telerik Test Studio, Robotium, etc.
70) What are the reasons for not using manual testing in the Automation Anywhere?The primary reason for not using manual testing is that it requires additional resources. It can also consume more time. If there are many projects or time-bound, then the performing tasks repeatedly are not possible.
71) Mention the characteristics of an ethical framework in Automation AnywhereEthical framework characteristics in Automation Anywhere are:
It must follow some coding practices.
The code should be reusable.
Ethical framework should have inbuilt reporting features.
It should be able to integrate with various kinds of frameworks and applications.
72) Explain Automation Anywhere bot storeDevelopers can purchase ready to use digital workers and bots from bot store of Automation Anywhere. These bots can automate repetitive tasks. It can saves development time as the bots are pre-built.
73) What RPA?Robotic Process Automation (RPA) is software that can mimic the action of a human user. It performs actions on a PC to automate business processes, which are highly repetitive and rule-based.
74) What are operating systems supported by Automation Anywhere Enterprise?Operating systems supported Automation Anywhere Enterprise are: 1) Windows 2008 R2, 2) Windows 2008 R2, 3) Windows 7, etc.
75) List Enterprise Control Room ComponentsEnterprise Control Room Components are:
Intel Pentium i5 or i7.
100 MB space on the hard disk for the installation.
4 GB RAM
Monitor having resolution 1024 x 768 or higher.
Internet Explorer 6.0 browser or later.
76) Explain the concept of auto-loginAuto-Login automatically unlocks the computer, runs the automated tasks, and returns the system to the original state.
77) Explain Session NameA session name defines a data stream. By default, the session is “Default”. Session name becomes important when there is a possibility of opening multiple connections simultaneously.
78) List terminal types that can be connected to a terminal emulatorTerminal types that can be connected to a terminal emulator are: 1) VT1000, 2) ANSI, 3) TN5250, and 4) TN3270.
79) What is Bot Farm?Bot Farm is integrated with Automation Anywhere Enterprise. It allows you to create multiple bots. Moreover, you can also give these bots on a rental basis.
80) How to deploy a task in Automation Anywhere Control Room? 81) Define MetaBots in Automation AnywhereA MetaBot is a blueprint of an application that can be re-used in order to optimize processes.
These interview questions will also help in your viva(orals)
Top 17 Linked List Interview Questions And Answers Updated For 2023
Definition of Linked List Interview
Linked list is the most used data structure which is linear in nature after the array data structure. Hence, it is obvious that you will come across many questions related to linked list while you will be giving an interview for post related to data manipulations or even any other technology related post. In this article, we will learn about some of the most frequently asked questions related to linked list in interviews.
Start Your Free Software Development Course
Web development, programming languages, Software testing & others
Question and AnswersLet us discuss questions and answer about Linked List Interview Questions.
1. What is linked list?Answer:
Linked list is a data structure which is linear in nature and does not stores the data in the sequential memory locations. A linked list consists of one or more nodes also called as links.
2. Tell about the graphical representation of linked list.Each link is a pair of two things one is the data part which holds the value of the element which needs to be stored in the linked list while the second part is the next which stores the address of the next link or node to which it pints to. The starting node or link is known as the head. The last node has its next part pointing to the null as there is no further node to be pointed which marks the end of the linked list as shown in the below figure.
As shown above each node contains the data field and the reference field. A linked list can contain any number of nodes depending on the data which we need to store and the memory capacity that is available.
3. How many linked list types are present?Answer:
There are following types of linked list:
• Circular Linked List
4. Describe the singly linked list.Answer:
The answers of first and second combining can be referred for this question’s answer.
5. Describe the doubly linked list.Answer:
In doubly linked multiple links or nodes are connected to each other and each of the node contains three field in it namely prev, data, and next containing the pointer to previous node, the data of the element, and the pointer to next element respectively. The graphical representation of the doubly linked list is as shown below –
6. Describe the circular linked list.Answer:
The following figure shows the visual representation of the working of the circular queue and the way in which the data is stored in it.
7. What type of memory allocation is used in implementation of linked list?Answer:
Dynamic memory allocation is used in linked list.
8. What is meant by traversing the linked list?Answer:
9. Specify the differences that exist between the linear array and linear linked list.Answer:
Linear Array
Linked List
Difficult for insertion and deletion No movement of nodes required to perform insertion and deletion.
Space is wasted as fixed size needs to be specified priorly. No wastage of memory due to dynamic memory allocation.
Same amount of time is required for availing different elements stored in array. Different amount of time is required for availing different elements stored in array.
Elements are stored consecutively. Elements may not be stored consequently.
Direct access to required node is done. Traversing of all the prior nodes needs to be done for reaching particular node.
10. What are applications of the linked list data structure?Answer:
Stacks, queues, skip unrolled linked list, binary tree, hash table, etc. are some of the applications of linked list.
Answer:
• No specification of the fixed size required as memory is allocated dynamically in runtime according to requirement.
Answer:
• Sequential access of the data needs to be done resulting in not able to use binary search which is why we cannot perform random access in linked list.
• More memory required for storing the pointer addresses.
• O(n) time complexity for accessing the element which results in slow performance due to recursion.
13. From where we bring the free node while performing the insertion operation of linked list?Answer:
Avail list
14. Name the header list which has the last node pointing to null pointer.Answer:
Grounded header list.
15. Which package is used in java programming language for implementing the linked list?Answer:
Java.util package.
16. In java, which interfaces implement the linked list?Answer:
The following interfaced implement linked list in java –
• Collection
17. Tell me about the process of adding the two linked list with the help of stack using java programming language.Answer:
The resultant linked list can be filled with the values in such a way that the sum of first element in first linked list will be done with the first element of the second linked list and the resulting value will be inserted in the first element for the resultant linked list. The same process will be carried out for the other elements of the linked list as well. If both the list are not of same length then the remaining elements of the longer list will be copied directly to the resultant list at the end of carrying out the sum for previous elements as explained previously.
ConclusionYou should be aware about all the basics of linked list and its working in order to prepare for interview. For the same thing, it is necessary that you go through all the above-mentioned questions and answers and clear yourself with the structure, working, and implementation of linked list data structure.
Recommended ArticlesThis is a guide to Linked List Interview Questions. Here we discuss questions and answers of structure, working, and implementation of linked list data structure. You may also have a look at the following articles to learn more –
Update the detailed information about Top 50 Sap Fico Interview Questions & Answers In 2023 on the Benhvienthammyvienaau.com website. We hope the article's content will meet your needs, and we will regularly update the information to provide you with the fastest and most accurate information. Have a great day!