0% found this document useful (0 votes)
58 views

Technical Questions

The document contains technical questions related to databases, coding, projects, and HR that could be asked during an interview. It includes questions about DBMS concepts like normalization, keys, ACID properties, joins, and anomalies. It also has coding questions on data structures, algorithms, OOP concepts and debugging. Project related questions ask about HTML/CSS/Bootstrap and programming languages. HR questions cover work experience, education, strengths/weaknesses and willingness to relocate.

Uploaded by

Sanjay Dutta
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views

Technical Questions

The document contains technical questions related to databases, coding, projects, and HR that could be asked during an interview. It includes questions about DBMS concepts like normalization, keys, ACID properties, joins, and anomalies. It also has coding questions on data structures, algorithms, OOP concepts and debugging. Project related questions ask about HTML/CSS/Bootstrap and programming languages. HR questions cover work experience, education, strengths/weaknesses and willingness to relocate.

Uploaded by

Sanjay Dutta
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Technical Questions

1. Tell me about yourself (45s, can also include your internship)


2. Tell me about your project.
3. If given to chance to work in Capgemini, in which project would you like to work on?
4. What are the recent advancements in DBMS?
5. What is DBMS used for?
6. DML, DDL, DCL difference.
7. What is UNION and UNION ALL
8. What are ACID properties in DBMS?
9. Do you know about DBMS and RDBMS?
10. In which format they store data in DBMS?
11. Do you the concepts of primary key?
12. What is primary key and unique key?
13. What is the difference between DELETE, DROP and TRUNCATE?
14. Do you know about Rollback?
15. What are the different Normalization techniques and what is normalization?
16. What is join and its type?
17. Can we undo the changes after the commit statement?
18. Do you know about Deadlock? What is it? Give example.
19. Do you know command prompt?
20. How do we get a file r insert files into command prompt from other disks?
21. What are the commands we use for inserting files?
22. How do we get all the files in the command prompt?
23. What is your strong area in IT field?
24. What is the language you prefer? (Expect follow up questions based on the language)
25. What is inheritance?
26. How do you explain access modifiers?
27. What are static variables
28. Database vs Data structure
29. C++ vs C
30. What are classes?
31. Define linked list
32. How to create objects?
33. How to do Exception handling
34. How to inherit abstract class?
35. How to join two tables having duplicate rows
36. What are data structures and why do we need it?
37. Scheduling algorithms
38. What is Overloading
39. What is Agile?
40. What is SDLC?
41. What is indexing?
42. What is Multithreading?

Coding

1. What is Armstrong number?


2. What is an AP series?
3. How to know a number is Prime?
4. How to know if a number is square or not?
5. How to find the factorial of a number?
6. Know about atoi and itoa
7. Time complexity and space complexity
8. How to debug your code?

Project Based

1. What is HTML/CSS/Bootstrap
2. Name some backend/frontend languages

HR

1. What productive work did you do in this lockdown period?


2. What is your CGPA?
3. Tell me about your internship.
4. What is your weakness?
5. Your family backgrounds.
6. Why do you want to work in Capgemini?
7. Any backlogs?
8. Are you willing to relocate?
9. How do you handle pressure?
10. Are you okay with working in shifts?
11. You have to sign a 2-year bond. Are you okay with that?
12. Show me your college ID.

1. What is Data, Database and DBMS?

Data is a collection of raw and isolated facts about and entity.


Database a well organised collection of data which follows an architectural solution for efficient
storing and retrieval of data.

DBMS or Database Management System is a software to create, manipulate and delete data
from a database.

2. What is an ER-Model/ER-Diagram?

An ER diagram shows the relationship between the entity set. An entity set is a group of similar
entities. Entity is a physical or conceptual object. Each entity differs w.r.t. the values.

3. Types of Attributes.
 Simple and Composite
 Single Values and Multi-valued
 Stored and Derived

4. What is Database Language? What is DDL, DCL and DML?

DBMS provides a specialized programming language called Database Language. SQL is the
standard database language. The provision of such language facilitates many functionalities to
the user.

 If DB language has High Dependency on Hardware and Software-> High degree of


Abstraction
 If DB language is independent of Hardware and dependent on Software-> Medium
degree of Abstraction
 If DB language independent of Hardware and Software-> Low of Abstraction

1. Data Definition Language (DDL)

DDL is used to describe the details of data, i.e. metadata. The conceptual schema is specified
using DDL. Every DBMS will have a compiler which processes DDL in order to construct and store
the schema into tables in a specified file called “Data dictionary”. Whenever a change is made to
the metadata, this file is consulted. E.g. CREAT, ALTER, DROP

2. Data Manipulation Language (DML)

Once the database schemas have been created and all the data has been entered, following
actions needs to be performed –

 Insertion of new information


 Modification of existing information
 Deletion of existing information
 Retrieval of existing information

The language that allows the above operations are called DML. E.g. SELECT , INSERT, DELETE
3. Data Control Language (DCL)

DCL is used to control privileges in a Database. Privileges are of two types –


1. System- Permissions for creating session, tables etc
2. Object- Permission for command queries.

In DCL we have two commands


1. Grant- Used to provide user access privileges to a database
2. Revoke-Used to take back permission

5. Responsibilities of Database Administrator


 Creating the Schema Definition-
The DBA creates the original Database Schema using DDL.

 Security and Integrity-


Data stored in the database must satisfy some constraint before being entered into the
database. These constraints are specified by the DBA

 Access Methods-
DBA provides authorisation to different users and systems

 Modification to “Data Dictionary”


Data Dictionary stores the original metadata about the schema. DBA are the only ones
who can modify it.

6. What are keys? Types of Keys

A key is an attribute/set of attributes which is can uniquely identify a row in a table.

1. Super Keys-
It is a set of attributes which when taken collectively, can be used to uniquely identify an all
entity in the entity set.

2. Candidate Key-
It is a super key, whose subset cannot be categorised as a super key.

3. Primary Key-
It is a candidate key which acts as the primary access mechanism of the entity set, set by the
DBA.

7. Difference between Unique and Primary Key

Primary Key Unique Key


Can’t Accept Null Values Can accept only 1 null value
We can have only one Primary Key in a table We can have more than one unique key in the
table.
Used to identify a unique row in a table Helps to maintain unique data in a column

9.What are the ACID properties in DBMS?

Atomicity By this we mean, that a transaction takes place


completely or doesn’t take place at all.
Consistency This means that the integrity constraints must
be maintained before and after a transaction.
Isolation This means that each and every transaction
which occurs must occur concurrently without
leading to any inconsistency. Changes made by
one transaction shouldn’t be visible to other
transaction unless it is written to memory.
Durability This means, that after the completion of a
transaction, updates, insertion or deletion, the
changes made should persist even after a
system failure.

10.Anamaloies while designing in Database.

 Insertion Anomaly
 Deletion Anomaly
 Updation Anomaly

11.What is Normalisation?

Normalization is a database schema designing technique by which we modify an existing database


schema to minimize redundancy and data dependency.
Normalization splits a table into multiple smaller tables and define relations between each of them.

12.Explain 1NF, 2NF, 3NF, BCNF and 4NF.

1. 1nf
 All column values should be atomic
 No repeating columns
 All rows of the same column should of same type

2. 2nf
 Must be in 1nf
 Shouldn’t have partial dependency
 Partial Dependency- when a non-prime attribute is dependent of prime attributes (those
which are part of candidate key)

3. 3nf
 Must be in 1nf and 2nf
 Should not have Transitive Dependency
 Transitive Dependency is a functional dependency where a non-prime attribute is
dependent on another non-prime attribute.

4. BCnf
 Must be in 1nf,2nf,3nf
 For a functionally dependency a->b, a must be a super key.

5. 4nf
 Must be bcnf
 No multivalued dependency

6. 5nf
 Must be in 4nf
 No join dependency

13.What are Joins? What are the different types of Joins?

Joins are operations to combine two or more relations to form a single new relation.

1.Natural Join

It is a join operation that creates an implicit join clause based on the common columns of
two tables.

2.Self join

It is a join operation that creates a table joined with itself.

3.Equi Join

An Equi join is a join condition that contains an equality operator.

4.Left Outer Join

It is a natural join but return those rows available in left table and not right table

5.Right Outer Join

It is a natural join but return those rows available in right table and not in left table.

14.What are the transaction states in DBMS.


15. What are the various errors in concurrency?

 Dirty Read Problem


This occurs when a transaction reads a value which is being modified by another
transaction but hasn’t committed it.

 Read-Write Conflict
Suppose T1 and T2 reads a value. T1 changes the value. T2 reads the value again but this
time it is different. This is a violation of isolation property.

 Phantom Read
This occurs when a transaction read some variable from the local buffer but then when it
reads it again, it is deleted by some other transaction.

 Lost Update/Write-Write Conflict


Consider T1 reads a variable and modifies it. T2 modifies the value of A, without reading
it. When T1 commits the changes made by T1 is no longer present. Hence when two
transaction access the same variable and modifies it but one of them gets lost.

16. What are various concurrency controls?

1. Time Stamping Protocols-


The timestamp-based algorithm uses a timestamp to serialize the execution of concurrent
transactions. This protocol ensures that every conflicting read and write operations are
executed in timestamp order. The protocol uses the System Time or Logical Count as a
Timestamp.
The older transaction is always given priority in this method. It uses system time to
determine the time stamp of the transaction. This is the most commonly used concurrency
protocol.
2. Lock Based Protocol-
To achieve concurrency isolation, the simplest method to is to first lock the data item on
which the operations is to be performed. After the operations are over, the data item is
unlocked.

17. What is Indexing? What are the different indexing methods?

Indexing is a data structure method by which we can efficiently retrieve database files on an
attribute based on which indexing is done.

 Primary Indexing
 Secondary Indexing
 Clustering Indexing
 Dense Indexing
 Sparse Indexing
 Multilevel Indexing

18. Difference between RDBMS and DBMS

You might also like