Top 50+ Infosys Interview Questions and Answers | Updated 2026

Latest IBM Freshers Interview Questions and Answers

About author

Rahul (Software Developer )

Rahul is a skilled Software Developer with a passion for crafting innovative solutions. With expertise in programming languages like Java and Python, he excels in building robust applications. Known for his problem-solving skills and attention to detail, Rahul thrives in collaborative environments. He is committed to continuous learning and staying updated with industry trends to deliver high-quality software.

Last updated on 17th Apr 2026| 7106

20555 Ratings

Infosys interviews often assess both technical and behavioral skills. Candidates can expect questions on programming languages, data structures, and algorithms for technical roles. Behavioral questions may focus on teamwork, problem-solving, and adaptability. It’s essential to prepare examples from past experiences that showcase your skills and align with Infosys’s core values, emphasizing your ability to learn and collaborate effectively.

1. Explain OOP concepts in Java ?

Ans:

 Object-Oriented Programming (OOP) has four main pillars: Encapsulation, Abstraction, Inheritance, and Polymorphism. Encapsulation means wrapping data and methods inside a class and restricting direct access using private/public, improving security. Abstraction hides implementation details and shows only essential features using abstract classes or interfaces. Inheritance allows a child class to reuse properties and methods of a parent class, reducing code duplication. Polymorphism means one method behaves in different ways, like method overloading or overriding, making code flexible and reusable.

2. Difference between C and Java ?

Ans:

Feature C Language Java
Programming Type Procedural programming language Object-oriented programming language
Approach Top-down approach Bottom-up approach
Platform Dependency Platform dependent Platform independent (JVM based)
Memory Management Manual (using pointers, malloc/free) Automatic (Garbage Collection)
OOP Support Does not support OOP concepts Fully supports OOP (Encapsulation, Inheritance, Polymorphism, Abstraction)
Security Less secure More secure due to JVM and no direct pointers

3. What distinguishes Method Overloading and Method Overriding in Java?

Ans:

DBMS (Database Management System) is software used to store, manage, and retrieve data in an organized way. It acts as an interface between the user and the database, allowing easy access and manipulation of data. DBMS helps in operations like inserting, updating, deleting, and querying data efficiently. It also ensures data security, reduces redundancy, and maintains data integrity. Examples of DBMS include MySQL, Oracle, and SQL Server. It is widely used in applications like banking systems, airline reservations, and online shopping platforms.

4. How do ClassesWhat is Normalization in DBMS and why is it important in database design?and Interfaces vary in Java?

Ans:

  • Normalization is the process of organizing data in a database in a structured and efficient way.
  • It is used to reduce data redundancy (duplicate data) and improve data consistency.
  • It divides large tables into smaller related tables and connects them using relationships.
  • This process helps in eliminating insertion, update, and deletion anomalies in databases.
  • Normalization follows a set of rules called Normal Forms such as 1NF, 2NF, 3NF, and BCNF.
  • Each normal form improves the structure of the database step by step.
  • It ensures better data integrity, meaning data remains accurate and reliable.

5. What is a programming language??

Ans:

A programming language is a formal set of instructions used to communicate with a computer and make it perform specific tasks. It allows developers to write code that can be executed by a machine to solve problems, process data, and build software applications. Programming languages act as a bridge between human-readable logic and machine-understandable instructions. Examples include C, C++, Java, Python, and JavaScript. These languages are used in different domains such as web development, mobile apps, data science, and system programming.

6. What is SDLC and what are the main phases involved in it??

Ans:

  • SDLC (Software Development Life Cycle) is a structured process used to design, develop, test, and deploy software applications.
  • It ensures that software is built in a systematic and efficient way with high quality.
  • SDLC helps developers manage time, cost, and resources effectively during software development.
  • It consists of several important phases that guide the entire development process.

7.What is Agile methodology and how is it useful in software development?

Ans:

Agile methodology is a modern software development approach that focuses on flexibility, collaboration, and continuous improvement. It divides a project into small parts called sprints or iterations, where each sprint delivers a working version of the software. After every sprint, feedback is taken from customers and improvements are made. Agile allows changes even in later stages of development, making it highly adaptable.

8. What is SQL ?

Ans:

SQL (Structured Query Language) is a standard language used to manage data in relational databases. It allows users to perform operations like SELECT, INSERT, UPDATE, and DELETE. SQL helps store, retrieve, and organize large data efficiently. It ensures data integrity, security, and easy access, and is widely used in database systems like MySQL and Oracle.

9. What is the difference between compiler and interpreter?

Ans:

Feature Compiler Interpreter
Translation Translates entire program at once Translates code line by line
Execution Speed Faster execution after compilation Slower due to line-by-line execution
Error Handling Shows all errors after compilation Stops and shows error immediately
Example C, C++ Python, JavaScript

10. What is cloud computing?

Ans:

Cloud computing is the delivery of computing services such as servers, storage, databases, networking, and software over the internet instead of using local computers. It allows users to access resources anytime, anywhere, with high scalability and flexibility. It reduces costs by eliminating the need for physical hardware and maintenance, as users pay only for the services they use.

11. Why should we hire you?

Ans:

  • Strong understanding of required skills and ability to apply them effectively
  • Quick learner who adapts easily to new tools and environments
  • Good problem-solving and analytical thinking abilities
  • Team player with clear communication skills
  • Responsible, reliable, and committed to meeting deadlines
  • Positive attitude with a willingness to take initiative
  • Eager to grow and contribute to the company’s success

12. What is the difference between HTTP and HTTPS?

Ans:

Feature HTTP HTTPS
Full Form HyperText Transfer Protocol HyperText Transfer Protocol Sec.
Security Not secure Secure (SSL/TLS encryption)
Data Protection Plain text transfer Encrypted data transfer
Port 80 443
Usage General websites Secure sites (login, payments)

13.  What is a computer network?

Ans:

A computer network is a collection of interconnected computers and devices that communicate with each other to share data, resources, and services. It allows users to exchange information, access the internet, share files, and use hardware like printers efficiently. Networks can be wired or wireless and help improve communication, collaboration, and resource utilization across systems.

14. What is an operating system?

Ans:

An operating system (OS) is system software that acts as an interface between the user and the computer hardware. It manages hardware resources, runs applications, handles memory, files, and processes, and ensures smooth functioning of the computer. Examples include Windows, Linux, and macOS.

15. What is a class in OOP?

Ans:

  • A class in OOP is a blueprint for creating objects. It acts like a design or template that defines how objects should be structured and behave. Without a class, we cannot create multiple similar objects in a structured way.
  • It defines properties (attributes) and behaviors (methods). Attributes store data like name or age, while methods define actions like run() or display(). Together they represent the characteristics and functionality of an object.
  • Objects are instances of a class. This means an object is a real entity created using the class blueprint. Each object can have its own values but follows the same structure defined by the class.

16. What is an object?

Ans:

  • An object is an instance of a class in OOP. It is created using a class blueprint and represents a specific example of that class in memory with its own unique identity.
  • It represents a real-world entity with state and behavior. This means an object can model things like a student, car, or bank account, combining both data and actions in a single unit.
  • State is defined by attributes (data). These attributes store information about the object such as name, color, age, or speed, which describe its current condition or properties.
  • Example: A “Car” object can be a specific car like red Toyota with actions like start and stop. Each car object can differ in color or model but still share common behaviors defined in the Car class.

17. What is exception handling?

Ans:

Exception handling is a mechanism used in programming to handle runtime errors and prevent program crashes. It uses keywords like try, catch, finally, and throw. For example, dividing a number by zero can cause an exception, which can be handled gracefully using exception handling techniques. It improves user experience.

18. What is Method overloading?

Ans:

  • Method overloading is a feature in object-oriented programming where multiple methods can have the same name but must differ in their parameter list. This means the method name remains the same, but the number, type, or order of parameters changes, allowing the same method name to perform different tasks based on input.
  • It allows methods to perform similar tasks with different types or numbers of inputs. This makes programming more flexible because a single method name can handle various operations depending on the data passed to it, reducing confusion and improving code organization.
  • It is an example of compile-time polymorphism. The decision of which method to call is made during compilation, not runtime, which helps in improving performance and efficiency in execution.

19. What is method overriding?

Ans:

Method overriding is a feature in object-oriented programming where a child class provides its own implementation of a method that is already defined in its parent class. The method in both classes must have the same name, same parameters, and same return type. Method overriding supports runtime polymorphism, meaning the decision of which method to execute is made at runtime based on the object type. For example, if a parent class Animal has a method sound(), a child class Dog can override it to define its own behavior like “Bark”.

20. What is a pointer in C, How We Use?

Ans:

A pointer is a variable that stores the memory address of another variable. It is used in C programming to access and manipulate memory directly. Pointers are powerful but must be used carefully to avoid errors like memory leaks. They are widely used in dynamic memory allocation and data structures like linked lists.

20. What is Java Virtual Machine (JVM)?

Ans:

JVM (Java Virtual Machine) is a part of Java Runtime Environment that executes Java bytecode. It makes Java platform-independent because the same code can run on any system with JVM installed. JVM handles memory management, garbage collection, and execution of programs, ensuring smooth performance of Java applications.

    Subscribe To Contact Course Advisor

    21. What is SQL JOIN?

    Ans:

     SQL JOIN is used to combine data from two or more tables based on a related column between them. It helps retrieve meaningful information by linking tables using primary and foreign keys. INNER JOIN returns only matching records, LEFT JOIN returns all records from the left table and matched ones from the right, RIGHT JOIN does the opposite, and FULL JOIN returns all records when there is a match in either table.

    SQL JOINS

    22. What is primary key in DBMS??

    Ans:

    • A primary key is a column or set of columns used to uniquely identify each record in a database table. It ensures every row has a unique identity.
    • It must contain unique values for each record. No two rows in the table can have the same primary key value, which avoids duplication of data.
    • A primary key cannot contain NULL values. Every record must have a valid value, ensuring completeness and reliability of the database.
    • A table can have only one primary key. However, that key may consist of multiple columns combined, known as a composite key.

    23. What is foreign key?

    Ans:

    A foreign key is a column or set of columns in a database table that refers to the primary key of another table. It is used to create and maintain relationships between two tables in a relational database. The foreign key ensures referential integrity, meaning that the value in the foreign key column must match an existing value in the referenced primary key column or can be NULL. It helps link related data across tables and prevents invalid data entries. For example, in a Student and Department table, Department_ID in the Student table can act as a foreign key referring to the Department table’s primary key.

    24.What is recursion?

    Ans:

    Recursion is a programming technique where a function calls itself to solve a problem. It breaks a complex problem into smaller sub-problems until it reaches a base condition, which stops the function from calling itself again. Recursion is commonly used in problems like factorial calculation, Fibonacci series, and tree traversal. However, if not used properly with a base case, it can lead to infinite loops or stack overflow errors.

    25. What is software testing?

    Ans:

    Software testing is the process of evaluating and verifying that a software application works correctly and meets the required requirements. It is done to find bugs, errors, or missing features before the software is released to users. Testing helps improve software quality, performance, security, and reliability. The main goal of software testing is to ensure the software is stable and works as expected in all conditions.

    26. What is SDLC waterfall model?

    Ans:

    • The Waterfall Model is a linear SDLC approach where each phase is completed step by step. It is simple and easy to manage for small projects.
    • It includes stages like requirement gathering, design, coding, testing, deployment, and maintenance. Each phase must be finished before the next begins.
    • It is best for projects with clear and fixed requirements. However, changes are difficult once development starts, making it less flexible.

    27.  What is a variable?

    Ans:

    A variable is a named memory location used to store data that can be changed during program execution. It acts as a container for holding values like numbers, characters, or strings. Each variable has a specific data type that defines the kind of data it can store. Variables make it easier to write flexible and reusable programs by allowing values to be updated and used in different operations.

    28. What is cloud storage?

    Ans:

    • Cloud storage is a service that allows users to store data such as files, photos, and documents on remote servers accessed through the internet instead of local storage devices. It provides easy access to data from anywhere, at any time, using different devices. Cloud storage offers scalability, backup, and data security, and users can increase or decrease storage based on their needs. Examples include Google Drive, Dropbox, and OneDrive.

    29.  What is a function in programming?

    Ans:

    • A function is a block of code designed to perform a specific task. It runs only when called and helps organize program logic into smaller, reusable parts for better structure and clarity.
    • It helps in breaking a program into smaller, manageable parts. This makes complex problems easier to solve by dividing them into simple steps that can be handled separately and efficiently.
    • Functions improve code reusability and avoid repetition. Once defined, a function can be used multiple times in a program without rewriting the same code again and again.

    30. What is debugging?

    Ans:

    Debugging is the process of identifying, analyzing, and fixing errors or bugs in a computer program. These errors may cause the program to behave incorrectly or stop working. Debugging helps developers find the root cause of issues and correct them to ensure the software runs smoothly and produces the expected output. The main goal of debugging is to improve the quality, reliability, and performance of the software.

    31. What is inheritance?

    Ans:

    Inheritance is an object-oriented programming concept where one class (child class) acquires the properties and behaviors of another class (parent class). It helps in code reusability, reduces duplication, and makes programs easier to manage. The child class can also add new features or override existing ones. For example, a “Vehicle” class can be a parent class, and a “Car” class can inherit its features like wheels and engine.

    32. What is polymorphism?

    Ans:

    Polymorphism is an object-oriented programming concept where a single action or method can have different behaviors depending on the object or context. The word means “many forms.” It allows the same function or method name to perform different tasks. Polymorphism can be achieved through method overloading (compile-time) and method overriding (run-time).

    33. What is encapsulation?

    Ans:

    • Encapsulation is an OOP concept that combines data and methods into a single unit called a class, helping to organize code and improve structure.
    • It restricts direct access to data using access modifiers like private, protecting information and ensuring data security and controlled access.

    34. What is a loop in programming?

    Ans:

    A loop in programming is used to execute a block of code repeatedly until a specific condition is met. It helps reduce repetition and makes code more efficient.

    • #include int main() { for(int i = 1; i <= 5; i++) { printf("%d\n", i); } return 0; }

    In this example, the for loop prints numbers from 1 to 5 by repeating the same code multiple times until the condition becomes false.

    35. What is an identifier?

    Ans:

    An identifier is the name given to variables, functions, arrays, or classes in programming. It helps in identifying and differentiating elements in a program. Identifiers must follow rules like starting with a letter or underscore and not using keywords. They improve readability and structure of the code, making it easier for developers to understand and maintain programs.

    36. What is data structure?

    Ans:

    A data structure is a way of organizing and storing data efficiently so that it can be accessed and modified easily. Examples include arrays, linked lists, stacks, queues, trees, and graphs. Choosing the right data structure improves program performance. It is widely used in software development to handle large and complex datasets effectively.

    37. What is clustering in statistics mining, and the way is it extraordinary from classification?

    Ans:

    Clustering in statistics mining is an unmanaged mastering method used to organization comparable statistics factors primarily based totally on their features, growing clusters of gadgets much like every apart from those in different groups. Unlike classification, where statistics factors are assigned to predefined classes primarily based on classified education statistics, clustering discovers the underlying shape inside the statistics without earlier labels. 

    38. What is a sorting set of rules, and explain the distinction between bubble kind and merge kind.

    Ans:

    A sorting set of rules is a way of rearranging a listing or array of factors in a special order, usually ascending or descending. Bubble type is a simple comparison-based set of rules that repeatedly steps through the listing, evaluating adjoining factors and swapping them if they are within the incorrect order. In contrast, merge kind is an extra green divide-and-triumph over a set of rules that divides the array into smaller subarrays, kinds them individually, and then merges them again.

    39. What is a graph and explain extraordinary graph traversal algorithms.

    Ans:

    A graph is a group of nodes related through edges, symbolizing relationships in statistics systems. Graphs may be directed or undirected they can incorporate cycles or be acyclic. DFS explores as a ways as feasible alongside a department earlier than backtracking, whilst BFS explores all associates at the existing intensity previous to shifting directly to nodes at the following intensity level. These algorithms locate paths, related components, and community flow.

    40. What is recursion, and why is it beneficial in algorithms?

    Ans:

    • Recursion is a programming method in which a feature calls itself to clear up a smaller example of an identical problem, which allows complicated issues to be broken down into easier subproblems. 
    • This method is beneficial in algorithms for obligations like searching, sorting, and traversing statistics systems together with timber and graphs. 
    • Recursive algorithms frequently bring about cleanser and extra readable code compared to iterative solutions. 
    • However, they are able to result in troubles like stack overflow if the recursion intensity is too excessive or if there may be no right base case to terminate the recursion. 

    41. Explain the time complexity of a set of rules and offer examples of unusual place time complexities.

    Ans:

    • Time complexity is a computational degree that describes the quantity of time a set of rules takes to finish as a feature of the dimensions of its entry. 
    • Common time complexities encompass O(1) (steady time), wherein the set of rules runs inside the identical time no matter the entered size, O(n) (linear time). 
    • Wherein time grows proportionally with the entered size O(n^2) (quadratic time), normal in algorithms with nested loops and O(log n) (logarithmic time), not unusual place in binary seek algorithms. 

    42. Explain the idea of a connected listing and evaluate connected and doubly lists.

    Ans:

    • A connected listing is a record shape along with a series of elements, every containing a reference (or pointer) to the following detail inside the sequence. 
    • This permits dynamic reminiscence allocation and green insertion and deletion operations. 
    • In a singly connected listing, every node consists of a records discipline and a connection with the following node even in a doubly connected listing. 
    • While doubly connected lists provide extra flexibility and simplicity of navigation, they require extra reminiscence consistent with node because of the extra pointer.

    43. Explain the idea of dynamic programming.

    Ans:

    Dynamic programming is a way of fixing complicated issues by bringing them down into less difficult subproblems and storing the consequences of those subproblems to keep avoidant computations. It is particularly beneficial for optimization issues, wherein it systematically builds up answers to large times primarily based on formerly solved smaller times. Dynamic programming is generally utilized in algorithms like the Fibonacci sequence, substantially enhancing performance with decreasing time complexity.

    44. Explain a few vital variations among C and C++.

    Ans:

    C is a procedural programming language centred on feature and technique calls, even as C++ is an object-orientated programming language that extends C by instructions and objects. This allows C++ to help ideas like encapsulation, inheritance, and polymorphism, improving code reusability and modularity. C++ additionally helps feature overloading, templates, and operator overloading, imparting extra flexibility in code design. These variations make C++ extra perfect for large packages requiring state-of-the-art records modelling.

    45. What are the variations among TCP and UDP protocols?

    Ans:

    Transmission Control Protocol and User Datagram Protocol are essential network delivery layer protocols. TCP is connection-oriented, setting up a dependable connection earlier than facts transfer, ensuring facts are are integrity via error-checking and retransmitting misplaced packets. This makes TCP appropriate for packages like internet surfing and record transfers, wherein reliability is crucial. In contrast, UDP is connectionless, permitting facts to be despatched without setting up a connection and ensuring delivery. 

    46. What is the Agile version in software program improvement?

    Ans:

    • The Agile version is a software program improvement technique emphasizing iterative improvement, collaboration, and flexibility. 
    • It encourages groups to paint in small increments, generally known as sprints, allowing non-stop remarks and variation to convert necessities. 
    • This technique permits common releases of practical software programs, allowing groups to reply quickly to consumer remarks and marketplace demands. 
    • Agile methodologies, which include Scrum and Kanban, have won a reputation because they recognize turning in cost and enhancing venture control performance.

    47. What do software programs trying out verification and validation entail?

    Ans:

    • Verification guarantees that the software program meets exact necessities and is constructed in keeping with layout specifications. 
    • Conversely, validation assesses whether or not the software program meets the wishes and expectancies of the end-users, answering “Are we constructing the proper product?”. 
    • Validation includes executing the software program in real-global situations and accomplishing consumer reputation trying out (UAT). 

    48. What is the distinction among DLL and EXE record extensions?

    Ans:

    • DLL (Dynamic Link Library) and EXE (Executable) are records extensions utilized in Windows running systems. It consists of the software’s code, resources, and essential facts to execute a selected task. 
    • An EXE record is an executable record consisting of software that may be run simultaneously through the running system. 
    • In contrast, a DLL record is a library that consists of code and facts that may be utilized by a couple of applications simultaneously. 
    • DLLs facilitate code reuse and modularization, permitting packages to a proportion, which complements the performance and decreases reminiscence usage.

    49. What is the distinction between White and Black fields trying out?

    Ans:

    White field trying out and black field trying out are awesome software programs trying out methodologies. In the white field trying out, testers can enter the software program’s inner structure, code, and algorithms, letting them look at instances primarily based totally on the code’s common sense. This technique is useful for figuring out logical errors, protection vulnerabilities, and overall performance problems. In contrast, the black field compares the software program’s capability without understanding its inner workings.

    50. What is supposed via way of means of Case manipulation features? Explain their different sorts in SQL.

    Ans:

    Case manipulation features in SQL are used to govern and compare situations primarily based totally on the case of strings. These features consist of UPPER(), which converts a string to uppercase LOWER(), which converts it to lowercase, and INITCAP(), which capitalizes the primary letter of every phrase in a string. Case manipulation features enhance information first-class and facilitate less difficult evaluation and reporting by standardizing textual content formats.

    51. What is the distinction between HashMap and ConcurrentHashMap?

    Ans:

    HashMap is sometimes thread-secure, which means that if more than one threads get the right to enter it concurrently, information inconsistencies can occur. In contrast, ConcurrentHashMap lets secure concurrent get right of entry from more than one thread without outside synchronization. It divides the map into segments, permitting more than one thread to examine and write in extraordinary segments. However, ConcurrentHashMap doesn’t permit null keys or values, in contrast to HashMap.

    52. What is the Java Memory Model (JMM), and why is it essential in multithreading?

    Ans:

    • The Java Memory Model (JMM) defines how threads interact through reminiscence and the policies for analyzing and writing variables. 
    • Without JMM, a thread won’t see the maximum latest updates to shared variables because of caching or CPU optimizations. 
    • JMM guarantees happens-before relationships to maintain a predictable multi-threaded environment. 
    • Understanding JMM is critical to avoid synchronization problems like race situations or stale information in concurrent programming.

    53. Explain the variations among synchronized and Lock interfaces in Java.

    Ans:

    • Synchronized is a keyword in Java that gives implicit locking on a block of code or technique, ensuring mutual exclusion. 
    • It is straightforward to apply, however inflexible; it routinely releases the lock whilst the method exits. 
    • The Lock interface from Java.util.concurrent.locks bundle gives greater manipulation over the lock’s behaviour.
    • Including looking to accumulate a lock with a timeout or interrupting a thread expecting a lock. 
    • Locks may be more flexible, permitting fine-grained manipulation, but are more complicated to apply correctly.

    54. What is the distinction between very last, sooner or later, and finalize in Java?

    Ans:

    • Sooner or later is a block utilized in exception management that guarantees code execution irrespective of whether or not an exception is thrown, usually to aid cleanup.
    • Finalize is a technique in Object elegance referred to as through the rubbish collector before an item is destroyed, permitting the item to smooth up assets. 
    • It’s not often used because of performance problems and unpredictable execution, with different mechanisms like try-with-assets being preferred.

    55. How does rubbish series painting in Java, and what are specific GC algorithms?

    Ans:

    Garbage series in Java is a computerized reminiscence control that reclaims reminiscence utilized by gadgets no longer in use. Java uses numerous GC algorithms, including Serial, Parallel, CMS, and G1. These algorithms vary in their techniques for balancing throughput, pause instances, and normal efficiency. The JVM divides reminiscence into old and young generations, with specific strategies for accumulating gadgets primarily based totally on their lifecycle.

    56. What are the unstable keywords and keywords? How does it vary from synchronization?

    Ans:

    The unstable keywokeywordantees that a variable’s price is usually studied from foremost memory instead of a thread’s neighbourhood cache, ensuring visibility of modifications throughout threads. It’s perfect for studying and writing variables through multiple threads without complicated locking. Operations requiring atomicity, like incrementing a counter, unstable on my own is insufficient, and mechanisms like synchronized or atomic lessons are needed.

    57. What are Lambda expressions, and how do they contribute to purposeful programming in Java?

    Ans:

    Lambda expressions, introduced in Java 8, allow treating capabilities as first-rate citizens, permitting the skip of behaviour rather than simply data. They simplify the syntax for enforcing purposeful interfaces, leading to more concise and readable code. Lambdas are critical for purposeful programming constructs, like streams, permitting greater declarative operations on collections, filtering, mapping, and decreasing. 

    58. What is a CompletableFuture, and how does it enhance asynchronous programming in Java?

    Ans:

    • CompletableFuture is part of Java’s Java. Util. Concurrent bundle that lets in writing asynchronous, non-blocking off code. 
    • It represents a destiny result of asynchronous computation and gives strategies to chain a couple of responsibilities using thenApply, thenAccept, or thenCompose. 
    • Unlike the older Future interface, CompletableFuture gives a higher guide for composing a couple of futures, dealing with exceptions, and reacting to project completion. 
    • It simplifies writing multi-threaded code that doesn’t block looking forward to the effects of long-strolling operations.

    59. Explain the distinction between ExecutorService and Fork/Join Framework.

    Ans:

    • ExecutorService is a part of the Java concurrency API designed to manipulate and manage the lifecycle of thread pools.
    • It facilitates running responsibilities asynchronously but only cuts them into smaller subtasks.
    • The Fork/Join framework, brought in Java 7, is optimized for parallelism and designed for responsibilities that may be damaged into smaller subtasks (recursive project division).
    • Fork/Join uses a work-stealing algorithm in which idle threads can “steal” responsibilities from busy threads` queues, enhancing aid usage in divide-and-overcome responsibilities.

    60. What are WeakReference, SoftReference, and PhantomReference in Java, and how are they used?

    Ans:

    These are reference kinds utilized in Java to interact with the rubbish collector. A WeakReference allows the item to be rubbish amassed if no sturdy references exist, which is beneficial in caches where items have to be amassed whilst reminiscence is low. SoftReference is comparable; however, much less aggressive, maintaining the item till reminiscence is low. They offer the best management over reminiscence control in unique scenarios.

    61. What is a recursive CTE?

    Ans:

    A recursive Common Table Expression (CTE) is a CTE that references itself in its question definition. It is used to carry out hierarchical or tree-like queries, locate organizational structures, record directories, or parent-toddler relationships. The recursive part of the CTE executes repeatedly, beginning with an anchor question and keeping until a termination situation is met. Recursive CTEs are more readable and maintainable than conventional self-joins. They are especially beneficial for querying hierarchical statistics in a database.

    62. What is the distinction among RANK(), DENSE_RANK(), and ROW_NUMBER()?

    Ans:

    • ROW_NUMBER() assigns a unique sequential quantity to rows, no matter duplicates, making it perfect for producing particular row numbers.
    • RANK() gives the identical quantity to rows with the same values but leaves gaps within the numbering if duplicates are found. 
    • DENSE_RANK() also offers an identical rank to duplicates but no longer leaves gaps within the rank numbering.
    • These capabilities are a part of window capabilities and are beneficial for rating results, paginating statistics, or dealing with tie instances in ordering results.

    63.  How to optimize a question that uses a couple of JOIN operations?

    Ans:

    • Query optimization with a couple of JOINs may be executed by inspecting execution plans, indexing applicable columns, and ensuring selective filtering is carried out early inside the question. 
    • Placing suitable indexes on columns utilized in JOIN situations improves performance. It’s also beneficial to lessen needless joins and subqueries by using EXISTS or IN in place of JOIN while applicable. 
    • Analyzing the part of the order is crucial, as SQL question planners could reorder joins for efficiency, and rearranging the joins manually can result in advanced performance.

    64. What is a correlated subquery, and how does it range from a normal subquery?

    Ans:

    • A correlated subquery relies upon values from the outer question, which means it’s far re-evaluated for every row processed through the outer question. 
    • This differs from a normal subquery, which is unbiased and completed once, imparting a result. 
    • Correlated subqueries may be slower because of repeated execution; however, they are beneficial for complicated row-through-row comparisons. 

    65.  Explain the distinction between HAVING and WHERE clauses in SQL.

    Ans:

    The WHERE clause filters rows before any groupings are made in an SQL query, while the HAVING clause filters corporations after the GROUP BY operation. WHERE is used for row-degree filtering, using situations immediately to person rows. AlternaotherING is carried out to mixture fea atures of grouped facts, permitting situations on summarsummarized. Both may be used collectively inside the identical query, with WHERE filtering rows earlier than aggregation and HAVING using post-aggregation filtering.

    66. What is a window characteristic, and how is it one of a kind from mixture features?

    Ans:

    • A window characteristic in SQL plays a calculation throughout a hard and fast of rows that might be associated with the contemporary row, in contrast to mixture features. 
    • It no longer organizes the organization into an unmarried output row. Instead, the window characteristic returns the result for every row while keeping the unique row set.
    • Functions like ROW_NUMBER(), RANK(), and LAG() are window features that may be used for obligations like ranking, strolling totals, and calculating variations among rows.

    67. How do UNION and UNION ALL vary in SQL?

    Ans:

    UNION combines the result units of or greater queries and eliminates reproduction rows, while UNION ALL combines the result units without eliminating duplicates. UNION plays a further sorting and evaluation operation to dispose of duplicates, which could make it slower than UNION ALL. If the result units won’t be recognized, otherwise need to preserve duplicates for analysis. UNION ALL is the greater green choice. Both operators require various columns and their facts to fit throughout the combined result units.

    68. Define CROSS JOIN.

    Ans:

    A CROSS JOIN produces the Cartesian fabricated from tables, meaning every row from the primary desk is paired with each row from the second desk. It results in many rows and is commonly used without being part of the specified circumstance. While only sometimes utilized in practice, CROSS JOIN may produce look-at facts, develop various categories, or read relationships in which all viable mixtures want to be considered. Care must be taken because of the capability length of the ensuing dataset.

    69. Explain database normalization and the unique regular normalization, 3NF.

    Ans:

    Database normalization is the method of organinormalization to decrease redundanorganizingendency issues. All columns incorporate atomic values in 1NF, no reparent groups exist. The desk should adhere to the requirements of 1NF in 2NF, and all non-key columns must completely rely on the number one key. 3NF (Third Normal Form), Higher regular forms (like BCNF) address extra complicated varieties of dependency removal.

    70. What is an impasse in working structures, and how can it not be prevented?

    Ans:

    • An impasse takes place whilst a hard and fast of techniques are blocked due to the fact every method is protecting an aid. 
    • Looking forward to every other aid held via way of means of every other method, growing a round dependency.
    • Deadlock prevention involves ensuring you the followinguations no longer hold.
    • A method hasst all assholdsat once, stopping protection of one aid even as looking forward to others.
    • Resources have to be preempted from a method of protecting them. Make assets sharable.
    • Impose a complete ordering of all aid sorts to avoid cyclic dependencies.

    71. Explain ACID residences in databases.

    Ans:

    • ACID stands for Atomicity, Consistency, Isolation, and Durability, which are important residences of database transactions.
    • Ensures that every one operations inside a transaction are finished effectively or none are. Makes certain that each transaction proceeds on its own without affecting the others.
    • Ensures that a transaction brings the database from one legitimate country to every other, retaining database rules.
    • It guarantees that when a transaction has been committed, it’ll continue to be within the machine even if there is a crash.

    72. Explain the variations between a relational and a non-relational database.

    Ans:

    Relational Databases (RDBMS) store facts in dependent tables with predefined schemas. Data is accessed through SQL, and table relationships are mounted through overseas keys. Examples include MySQL, PostgreSQL, and Oracle. Non-relational Databases (NoSQL) store unstructured or semi-dependent facts without a hard and fast schema. They are extra flexible and scalable for huge data applications.

    73. What is the distinction between a summary elegance and an interface in Java?

    Ans:

    Both urban techniques and summary methods are possible. Urban techniques permit defining a few default conducts and are extended through subclasses. They help unmarried inheritance. They can best have summary methods and are carried out through classes. Starting with Java 8, interfaces can also have default and static methods. Multiple interfaces may be carried out through an unmarried elegance, permitting more than one inheritance of conduct.

    74. Difference between multithreading and multiprocessing?

    Ans:

    Multithreading means to more than one thread inside an unmarried procedure sharing the equal reminiscence area and resources. It’s typically used to acquire parallelism inside an unmarried utility. Multiprocessing refers to more than one approach strolling on more than one core or CPU, wherein every procedure has its personal reminiscence area. With extra overhead compared to multithreading because of procedure introduction and inter-procedure verbal exchange.

    75. Explain the idea of layout styles in software program engineering.

    Ans:

    • Design styles are reusable answers to not unusualplace software program layout problems. 
    • They offer general terminology and are high-quality practices for fixing ordinary troubles in software program structure. 
    • Design styles fall into 3 principal categories Creational, which copes with item introduction mechanisms. 
    • They assist in enhancing code readability, maintainability, and scalability by selling layout consistency throughout projects.

    76. What are microservices, and how do they range from monolithic structures?

    Ans:

    • Microservices is an architectural fashion that systems a utility as a group of small, loosely coupled offerings, every strolling independently and specializing in a particular enterprise capability. 
    • Microservices provide extra scalability, maintainability, and versatility as man or woman offerings may be developed, deployed, and scaled independently. 
    • They introduce complexities in inter-carrier verbal exchange and deployment phrases, making them extra appropriate for large, complicated systems.

    77. What are the blessings and drawbacks of the use of RESTful APIs?

    Ans:

    • RESTful APIs (Representational State Transfer) are famous for designing networked packages because of their simplicity, scalability, and fashionable HTTP strategies like GET POST, PUT and DELETE. 
    • Advantages include stateless communication, smooth caching, and platform independence. They are lightweight, making them appropriate for cell and internet packages. 
    • However, dangers include loss of integrated protection and boundaries on complicated operations because of the restrictions of the HTTP protocol.

    78. Define software program refactoring and why it is crucial.

    Ans:

    Refactoring is the technique of restructuring present code without converting its outside behaviour to enhance its readability, maintainability, and performance. It includes cleansing up code, casting off redundancies, simplifying complicated sections, and ensuring the code adheres to high-satisfactory practices. Refactoring is crucial as it saves technical debt from accumulating, which could make the device more difficult to keep and make bigger over time. 

    79. What is the distinction between coupling and brotherly love in software program design?

    Ans:

    Coupling is the degree of dependence between distinct modules or additives in a device. Low coupling is ideal as it reduces the danger that modifications in a single module will affect others, making the device less difficult to keep and scale. Cohesion, on the other hand, refers to how carefully associated and centred the duties of an unmarried module are. High brotherly love is prime because the module efficiently plays a selected undertaking, enhancing readability and reusability.

    80.. What is Test-Driven Development (TDD), and how does it enhance software programs first-rate?

    Ans:

    Test-driven development (TDD) is a software program improvement exercise in which builders write exams for brand-spanking new capabilities earlier than writing the real code. The technique includes:

    • Writing a failing test.
    • Writing simply sufficient code to skip the test and.
    • Refactoring the code to ensure excessive first-rate.

    TDD improves software programs first-rate by ensuring that every code block has related tests, decreasing the variety of bugs, and inspiring builders to write clean, green code. 

    81. What are the benefits of using MVC structure in software program layout?

    Ans:

    MVC (Model-View-Controller) is a layout sample that separates software into 3 interconnected components:

    • The Model (which manages statistics).
    • The View (which handles the presentation layer).
    • The Controller (which procedures consumer enter and updates the Model).

    The essential benefits of MVC are the reusability of components, progressed corporation of code, higher testability, and the capacity to independently regulate the consumer interface without affecting commercial enterprise logic.

    82. What is Continuous Testing, and how does it relate to DevOps?

    Ans:

    Continuous Testing checks software programs at each degree of the improvement lifecycle, beginning from the early improvement section and persevering through deployment and operation. It entails automating assessments and integrating them into the CI/CD pipeline to ensure that code adjustments are robotically validated. In a DevOps environment, Continuous Testing is vital for ensuring that the software program stays dependable and practical as new functions are constantly deployed. 

    83. What is technical debt, and in the way can it affect software program improvement?

    Ans:

    Technical debt refers to the greater paintings required to restore shortcuts or suboptimal answers to fulfil time limits or lessen preliminary improvement efforts. Accumulating technical debt can gradually improve destiny as builders spend extra time-solving issues, refactoring code, or managing unscalable systems. To manipulate technical debt, groups must frequently refactor code, prioritize long-time period answers over short fixes, and ensure that improvement practices emphasize code quality.

    84. What is the distinction between REST and SOAP internet services?

    Ans:

    • REST (Representational State Transfer) and SOAP (Simple Object Access Protocol) are specific strategies for constructing Internet services. 
    • REST is lightweight, stateless, and uses general HTTP methods (GET, POST, PUT, DELETE) for communication. It usually exchanges statistics in codecs like JSON or XML. 
    • SOAP is extra rigid, uses XML for all messages, and comprises integrated protection and transaction support, making it appropriate for complex, enterprise-degree applications. 
    • REST is desired for simplicity and scalability, while SOAP is used when there are particular necessities like protection or ACID transactions.

    85. What is load balancing, and why is it crucial in software program systems?

    Ans:

    • Load balancing dispenses incoming community visitors throughout multiple servers to ensure no unmarried server is overwhelmed, enhancing gadget reliability, scalability, and overall performance. 
    • Load balancers may be hardware- or software-program-based and use algorithms like round-robin, least connections, or IP hash to distribute requests.
    • Load balancing facilitates attaining excessive availability via way of means of making sure redundancy and dispensing the workload efficiently.

    86. What are the important thing variations among horizontal and vertical scaling?

    Ans:

    • Horizontal scaling entails including extra servers to distribute the load, at the same time as vertical scaling method growing the resources of an unmarried server. 
    • Horizontal scaling gives higher fault tolerance and might deal with a large increase in visitors because the load is shared throughout more than one machine. 
    • In current allotted systems, horizontal scaling is favoured because of its flexibility, cost-effectiveness, and potential to deal with large-scale applications.

    87. Define the CAP Theorem in allotted systems.

    Ans:

    The CAP Theorem states that in an allotted gadget, it’s impossible to attain Consistency, Availability, and Partition Tolerance all at once. In the consistency method, all nodes see equal information at equal time availability guarantees that each request gets a response, and in the Partition Tolerance method, the gadget keeps functioning no matter community screw ups. Due to community screw ups in real global allotted systems, a trade off should be made between consistency and availability. 

    88. What is the distinction between vital and declarative programming?

    Ans:

    Imperative programming makes a speciality of a way to attain a venture by specifying a chain of instructions that alternate the program’s kingdom step via way of means of step. Common vital languages consist of C, Java, and Python. SQL and useful programming languages like Haskell are examples of declarative languages. Declarative programming allows for extra summary and concise code however may also conceal info on overall performance optimizations.

    89. What is the motive of middleware in software program improvement?

    Ans:

    • Middleware is a software program that acts as a bridge among extraordinary programs or structures, allowing them to talk and control statistics efficiently. 
    • It sits among the working machine and the application, facilitating responsibilities like database entry, message brokering, authentication, and statistics transformation. 
    • By coping with those not-unusual place functions, middleware simplifies the improvement procedure and lets builders be cognizant of enterprise good judgment.

    90. What are the benefits and drawbacks of cloud computing?

    Ans:

    Cloud computing gives numerous benefits, such as scalability, wherein sources may be scaled up or down primarily based totally on demand; price savings, as companies best pay for what they use and accessibility, permitting customers to get entry to sources from everywhere with a web connection. Capability downtime if cloud offerings face outages, and seller lock-in, wherein migrating offerings among vendors may be complicated and costly.

    Upcoming Batches

    Name Date Details
    Infosys

    13 - Apr - 2026

    (Weekdays) Weekdays Regular

    View Details
    Infosys

    15 - Apr - 2026

    (Weekdays) Weekdays Regular

    View Details
    Infosys

    18 - Apr - 2026

    (Weekends) Weekend Regular

    View Details
    Infosys

    19 - Apr - 2026

    (Weekends) Weekend Fasttrack

    View Details