Search Your Question...!

What is DBMS?

A database management system (DBMS) is system software for creating and managing databases. The DBMS provides users and programmers with a systematic way to create, retrieve, update and manage data.

A database is an organized collection of data. It is the collection of schemes, tables, queries, reports, views and other objects. The data is typically organized to model aspects of reality in a way that supports processes requiring information, such as modelling the availability of rooms in hotels in a way that supports finding a hotel with vacancies.

A database management system (DBMS) is a computer software application that interacts with the user, other applications, and the database itself to capture and analyze data. A general-purpose DBMS is designed to allow the definition, creation, querying, update, and administration of databases. Well-known DBMSs include MySQL, PostgreSQL, Microsoft SQL Server, Oracle, Sybase and IBM DB2. A database is not generally portable across different DBMSs, but different DBMS can interoperate by using standards such as SQL and ODBC or JDBC to allow a single application to work with more than one DBMS. Database management systems are often classified according to the database model that they support; the most popular database systems since the 1980s have all supported the relational model as represented by the SQL language. [disputed – discuss] Sometimes a DBMS is loosely referred to as a 'database'.

A DBMS makes it possible for end users to create, read, update and delete data in a database. The DBMS essentially serves as an interface between the database and end users or application programs, ensuring that data is consistently organized and remains easily accessible.

Bundling with Webpack (002) MCQ's

1. Executing the following command will automatically create a file named: webpack_practice >>

   View Answer   

    npm init  -->Package.json



2. Which of these softwares is necessary to install webpack

   View Answer   

    Node.js



3. Webpack supports third party libraries

   View Answer   

   True



4. The distinct feature of webpack is

   View Answer   

   code splitting



5. Webpack supports third party libraries

   View Answer   

   True



Microprocessor Terminologies

Data Transfer Instructions

MOV -- This instruction copies the contents of the source register into the destination register

MVI -- The 8-bit data is stored in the destination register or memory.

LDA -- The contents of a memory location, specified by a in the operand, are copied to the accumulator.

LDAX -- The contents of the designated register pair point to a memory location. This instruction copies the contents of that memory location into the accumulator.

How to Hide Any Drive in Windows Using Command Prompt

There are Two Method to Hide Drive in Windows Using Command Prompt Lets Follow Each Steps:

Method 1 of 2

Step 1: Type CMD in Start menu search area and hit Enter to launch Command Prompt. You can also find the Command Prompt under Accessories category in Start menu. In Windows 10 and 8.1, you can right-click on the Start button, and then click Command Prompt to open the same.

Step 2: In the Command Prompt, type Diskpart and hit enter key. Click Yes if you are prompted with UAC (User Account Control) dialog-box.

Kafka MCQ's

1. A hashing-based Partitioner takes ___ and generates a hash to locate which partition the message should go

   View Answer   

   Partition Key



2. Banking industry can leverage Kafka Streams for detecting fraudulent transactions.

   View Answer   

   True



3. Which messaging semantics do Kafka use to handle failure to any broker in cluster?

   View Answer   

   acks



4. Kafka only provides a total order over records within a partition, not between different partitions in a topic.

   View Answer   

   True



5. The only metadata retained on a per-consumer basis is the position of the consumer in the log, called :

   View Answer   

   Offset



R-dplyrops-fdadata

From a given data set fda which contains data on warning letters sent to doctors by the U.S. Food and Drug Administration, because of problems in the way in which they ran clinical trials testing experimental treatments. Contains the following variables:

name_last name_first name_middle Doctor’s last, first, and middle names.

issued Date letter was sent.

office Office within the FDA that sent the letter.

Now,

(a)Include the packages required and read the data from the data set fda.

(b)Filter the data for letters sent from the start of 2005(1'st January 2005) onwards and print it. 

(c)Count the number of letters issued by year and print it .

Infrastructure as Code MCQ's

1. When a server requires special configuration beyond that covered by automated deployment scripts, it is called

a) Snowflake Server
b) Server Sprawl
c) Automation Fear
d) Configuration Drift

   View Answer   

   Snowflake Server



2. __________ configuration is faster than ___________ configuration

a) Automated, Manual
b) Manual, Hybrid
c) Manual, Automated
d) Automated, Hybrid

   View Answer   

   Automated, Manual



3. For quick configurations, the servers must be

a) Well configured
b) Automated
c) Identical
d) Different

   View Answer   

   Identical



4. Which is directly proportional to your business?

a) Clarity
b) Security
c) None of the options
d) Availability

   View Answer   

   Availability



5. IaC is frequently referred to as, _

a) infrastructure automation
b) Infrastructure Programming
c) Programmable infrastructure
d) Automated Infrastructure

   View Answer   

   Programmable infrastructure



Elements of User Experience MCQ's

1. Which one of the following techniques helps us in understanding user needs?

   View Answer   

   All



2. navigation allows the user to access nearby screens in the architecture.

   View Answer   

   Local



3. The discipline involved in creating a structured experience for the user is know as 

   View Answer   

   ID



4. _________ is getting your users to test what you have produced.

   View Answer   

   UT



5. help us to analyze the precise steps that user performs to complete a task.

   View Answer   

   TA



Git: Stashing changes - Basic (Java)

 Welcome to Git: Stashing changes - Basic (Java).

This question is used to evaluate your skills on stashing the changes in Git.

For this, you will be evaluated based on the following operations. The remote repository has been pre-configured into your local git repository.

  1. Your local git repository will be linkedlist_java.
  2. Push the master branch of local git repository to the remote repository.
  3. Create a new branch with the name new_branch.
  4. Make a change to the Java program file (do not remove it), make a commit and push the branch.
  5. Make a few more changes to the Java program file and stash those changes.

FOOD FEST Using Python

A food fest is organised at the JLN stadium. The stalls from different states and cities have been set up. To make the fest more interesting, multiple games have been arranged which can be played by the people to win the food vouchers. One such game to win the food vouchers is described below:

There are N number of boxes arranged in a single queue. Each box has an integer I written on it. From the given queue, the participant has to select two contiguous subsequences A and B of the same size. The selected subsequences should be such that the summation of the product of the boxes should be maximum. The product is not calculated normally though. To make the game interesting, the first box of subsequence A is to be multiplied by the last box of subsequence B. The second box of subsequence A is to be multiplied by the second last box of subsequence B and so on. All the products thus obtained are then added together.

If the participant is able to find the correct such maximum summation, he/she will win the game and will be awarded the food voucher of the same value.

Note: The subsequences A and B should be disjoint.

Rajesh Repair & Services

Rajesh Repair and Service in Mumbai


Rajesh Repair and Service in Mumbai is one of the leading businesses in the LED TV Repair & Services. Also known for LED TV Repair & Services, LED TV Repair & Services-Sony, LED TV Repair & Services-LG, LED TV Repair & Services-Samsung, LED TV Repair & Services-Videocon, LED TV Repair & Services-Panasonic, LED TV Repair & Services-Mi, LED TV Repair & Services-Philips and much more. Find Address, Contact Number, Reviews & Ratings, Photos, Maps of Rajesh Repair and Service, Mumbai.



Machine Learning Using scikit-learn MCQ's

1. Which of the following utility of Pandas can be used to read from Oracle database?

   View Answer   

   read_sql



2. What do the methods starting with fetch, of sklearn.datasets module do?

   View Answer   

   It downloads a specific dataset from a library.



3. Which of the following function is used for loading famous iris dataset from sklearn.datasets?

   View Answer   

   load_iris()



4. Which of the following Python library is used for Machine Learning?

   View Answer   

   Scikit-Learn



5. Which of the following module of sklearn contains popular datasets, which are processed?

   View Answer   

   datasets



Find the Winner using Python

Andrea and Maria each have a deck of numbered cards in a pile face down. They play a game where they each alternately discard and flip the cards on the pile from top to bottom.

At the beginning of the game, someone will call out "Even" or "Odd". The first move depends on which is called. If "Even" is called, the player's top cards are flipped so they can see the face value. If instead "Odd" is called, the top card is removed from each deck and discarded, then each flips her next card. Andrea subtracts the value of Maria's card from her own and adds the result to her score. Likewise, Maria subtracts the value of Andrea's card from her own and adds the result to her score.

From this point forward, each alternately discards then flips a card. Each time two cards are flipped, the players' scores are computed as before. Once all the cards have been played, whoever has the most points wins.

As an example, Maria's cards, face down, are [3, 5, 6] and Andrea's are [4, 5, 7]. After calling "Even" at random, the game begins. The following table represents game play with cumulative score at the bottom. Maria's score is -2, Andrea's is +2 so Andrea wins.

Area of Triangle using Javascript

You are given 3 sets of coordinates that form a triangle. Write code to find the area of the triangle enclosed by those coordinates.

For example, the 3 points have coordinates given as x = [0, 3, 6] and y = [0, 3, 0], aligned by index, so the coordinates are [0,0], [3,3], [6,0]. The height of the triangle is 3, and the width is 6, so the area of the triangle is 6 * 3 / 2 = 9. All resulting areas will be whole numbers. Not all triangles will contain a right angle.

 

Image Classification MCQ's

1. Identify the unstructured data from the following

   View Answer   

   both image and Video clip



2. Which preprocessing technique is used for dimensinality reduction?

   View Answer   

   SVD



3. Technique used to evaluate a classifier by dividing the data set into train set to train the classifier and test set to test the same.

   View Answer   

   cross validation



4. True Negative is when

   View Answer   

   predic are and actual negative



5. True Positive is when

   View Answer   

   predic are and actual  not  negative



Shifting Strings using R Language

 We define the following operations on a string:

  • Left Shift: A single circular rotation of the string in which the first character becomes the last character and all other characters are shifted one index to the left. For example, abcde becomes bcdea after one left shift and cdeab after two left shifts.
  • Right Shift: A single circular rotation of the string in which the last character becomes the first character and all other characters are shifted one index to the right. For example, abcde becomes eabcd after one right shift and deabc after two right shifts.

 

GIT INTERVIEW QUESTIONS - 1

 1) What is GIT?

GIT is a distributed version control system and source code management (SCM) system with an emphasis to handle small and large projects with speed and efficiency.

  2) What is the command you can use to write a commit message?

The command that is used to write a commit message is “git commit –a”. The –a on the command line instructs git to commit the new content of all tracked files that have been modified. You can use “git add<file>” before git commit –a if new files need to be committed for the first time.

 3) What is the difference between GIT and SVN?

 The difference between GIT and SVN is

 a)  Git is less preferred for handling extremely large files or frequently changing binary files while SVN can handle multiple projects stored in the same repository.

 b) GIT does not support ‘commits’ across multiple branches or tags. Subversion allows the creation of folders at any location in the repository layout.

 c) Gits are unchangeable, while Subversion allows committers to treat a tag as a branch and to create multiple revisions under a tag root.

 

AWS Essential MCQ's

1. _____ mixes the simplicity of ________ with the power of _____, to great effect.

   View Answer   

   Paas,Saas,Iaas



2. Developers and organizations all around the world leverage ______ extensively

   View Answer   

   Paas



3. The committee which designs the standards & characteristics for the cloud computing is

   View Answer   

   NIST



4. I have some private servers on my premises, also I have distributed some of my workload on the public cloud, what is this architecture called?

   View Answer   

   HC



5. Cloud-computing providers offer their services as

   View Answer   

   IPS



Story Telling MCQ's

1. _________ uses system of color coding to represent different values.

   View Answer   

   Heat maps



2. _______ helps you get familiar with data.

   View Answer   

   exploratory



3. When the content is very less, we can leverage _________ to display information.

   View Answer   

   simple text



4. Cognitive load theory is created by 

   View Answer   

   john sweller



5. Keeping Color consistent helps the audiences to know that these two pieces of information are related.

   View Answer   

   True



 

Structured Data Classification MCQ's

1.  Identify the structured data from the following.

   View Answer   

   Data from mySQL DB and Excel



2. What kind of classification is our case study 'Churn Analysis'?

   View Answer   

   Binary 



3. Which command is used to identify the unique values of a column?

   View Answer   

   unique()



4. Which preprocessing technique is used to make the data gaussian with zero mean and unit variance?

   View Answer   

   Standardisation



5. Cross-validation technique is used to evaluate a classifier by dividing the data set into training set to train the classifier and testing set to test the same.

   View Answer   

   True 



DevOps MCQ's

1. DevOps is the union of ___ , ____ and __ to enable continuous delivery of value to end users.

   View Answer   

   People, Processes and Products. 



2. Improve quality and performance of the applications is a major driver for switching to DevOps

   View Answer   

   True  



3. Understanding of what we are deploying and how we are deploying comes under which habit of DevOps

   View Answer   

   Configuration Management



4. Product Management is one of the 7 DevOps practices

   View Answer   

   False  



5. Which of the following is a value of DevOps

   View Answer   

   DevOps goals span the entire delivery pipeline 



More on Git MCQ's

1. What is the git command to see the last 3 commits in one line ?

   View Answer   

   git log -–oneline -3 



2. How do I view all the commits for the last 2 weeks ?

   View Answer   

   git log -–since=”2 weeks ago” 



3. What is the significance of using –index in the git stash pop - - index command ?

   View Answer   

   To pull the staged changes  



4. What is the command to temporarily store uncommitted ?

   View Answer   

   git stash 



5. What command should I use to retrieve my files that have been temporarily stashed ?

   View Answer   

   git stash pop – index 



UIPATH Orchestrator MCQ's | Interview Preparation | RPA

1. What happens if a new job is triggered while the robot it is assigned to is executing a different process?

   View Answer   

   The new job is left in a ‘Pending’ state until the robot finishes executing the process. The new job is executed as soon as the robot becomes available



2.  Is it possible to check whether a Robot that is connected to Orchestrator is available or not in real time?

   View Answer   

   Yes, this is possible through the Heartbeat mechanism; the status of each robot is updated on the Robots page



3. Is it possible to reprocess a transaction in a Queue after its failure due to an application exception?

   View Answer   

   Yes, if the Auto-Retry property of the Queue is enabled Yes, it can be retried manually on the Transactions page



4. How are Robot Keys generated?

   View Answer   

   Orchestrator generates unique Robot Keys during the robot provisioning process



5.  Is using the ‘Publish’ button in Studio the only way to upload a package to Orchestrator?

   View Answer   

   No. Packages can also be published via the Packages page in Orchestrator



UIPATH MCQ's | Interview Preparation - 3 | RPA

1. How many Catches can you have in a Try/Catch block?

   View Answer   

   There is no limit on the number of catches.



2.  When running a workflow how can you see the steps the workflow is executing

   View Answer   

   Using Debug with Highlight Activities option, Using Debug and inspecting the Output panel



3. What happens if you put a Breakpoint on a Click activity and start the workflow in Debug mode

   View Answer   

   The workflow will be paused until you click the Continue button.



4. What can you use to make sure that the execution continues even if an activity fails

   View Answer   

   Try/Catch activity



5.  Where can you see the variables’ values during workflow execution

   View Answer   

   In the Locals pane



UIPATH MCQ's | Interview Preparation - 2 | RPA

1. Consider having an application in Citrix Environment that has a button named ‘Accept’ and also a label that contains the Accept word. How can Click Text be customized in order to access the correct button?

   View Answer   

   By using the Occurrence property.



2. What can be done when the Windows Remote Connection doesn’t allow sending hotkeys?

   View Answer   

   It should work if the Windows Remote Connection is in ‘full-screen’ mode.



3. What happens if Find Image doesn’t actually find the desired image?

   View Answer   

   An exception is thrown.



4. Can a Pick Branch activity be used alone?

   View Answer   

   No, it can only be added inside a Pick activity body.



5. What is the EASIEST navigation method to be used in a form within Citrix?

   View Answer   

   By sending keyboard commands/hotkeys



UIPATH MCQ's | Interview Preparation - 1 | RPA

1. The Type Into activity can receive inputs like:

   View Answer   

   A variable followed by .tostring method & A static String



2. Getting the content of a PDF document is possible:

   View Answer   

   By opening the pdf and using screen scraping to get its data & By using the read Pdf text activity and providing the pdf file’s path



3. What kind of actions can be performed in the Variables panel?

   View Answer   

   Setting default values for variable & Changing variable type & Adding new variable



4. Where can you see the list of activities that you can use in a workflow?

   View Answer   

   In the Activities panel



5. How can you extract structured data from a web page?

   View Answer   

   Using the Data Scraping Wizard



Bill Division | Python Solution | Hackerrank

Two friends Anna and Brian, are deciding how to split the bill at a dinner. Each will only pay for the items they consume. Brian gets the check and calculates Anna's portion. You must determine if his calculation is correct.

For example, assume the bill has the following prices: Bill=[2,4,6]. Anna declines to eat item k= bill[2] which costs 6. If Brian calculates the bill correctly, Anna will pay (2+4)/2=3. If he includes the cost of bill[2], he will calculate (2+4+6)/2=3. In the second case, he should refund 3 to Anna.

Unstructured Data Classification MCQ's

1.  Identify the unstructured data from the following.

   View Answer   

   IMAGE



2.  What kind of classification is our case study 'Spam Detection'?

   View Answer   

   BINARY



3.  Which preprocessing technique is used to remove the most commonly used words?

   View Answer   

   STOPWORDS



4.  Cross-validation technique is used to evaluate a classifier by dividing the data set into training set to train the classifier and testing set to test the same.

   View Answer   

   TRUE



Advanced Time Series Analysis MCQ's

1.  An Ideal ACF plot will increase exponentially ?

   View Answer   

   False



2.The Partial Auto Correlation Function is useful in detecting the Order of AR process.

   View Answer   

   True



3.  Non Stationary Time series will have a declining effect ?

   View Answer   

   False




Statistics with Python MCQ's


1.  Which of the following definition is used by default in kurtosis method of scipy.stats module?

   View Answer   

   fisher



2. Which of the following method of scipy.stats module is used to determine inter quartile range a distribution?

   View Answer   

   iqr



3. Which of the following equations represent inter-quartile range (IQR)?

   View Answer   

   Q3 - Q1



4. Which of the following expressions, correctly calculate variance of a sample, x, derived from a population?

   View Answer   

   np.var(x, ddof=1)



5. What is the output of the following expression?

   View Answer   

   from scipy import stats print(stats.mode([8, 9, 8, 7, 9, 6, 7, 6])) ModeResult(mode=array([6]), count=array([2]))



Structured Data MCQ's

1.  Identify the structured data from the following

   View Answer   

   Data from mySQL DB and Excel



2. What kind of classification is our case study 'Churn Analysis'?

   View Answer   

   Binary



3. Which command is used to identify the unique values of a column?

   View Answer   

   unique()



4. Which preprocessing technique is used to make the data gaussian with zero mean and unit variance?

   View Answer   

   Standardization



5. True Negative is when the predicted instance and the actual is positive.

   View Answer   

   False



Blockchain MCQ's

1.  Blockchain which is popularly known as ‘for the people, by the people and of the people” is ___________.

   View Answer   

   public



2. Bitcoin network would make it impossible to bypass the traditional financial intermediaries.

   View Answer   

   False



3. The three concepts used to explain the foundation of blockchain are __________________.

   View Answer   

   business n/w,digital assets,ledger



4. Private Blockchain is a de-centralized type of Blockchain?

   View Answer   

   False



5. The value of coins ( litecoin, bitcoin) is same at a particular time.

   View Answer   

   False



Data visualization MCQ's

 1.What needs to be considered first before you start a data visualization presentation?

Ans:- Data

2.Data Visualization makes complex data more

Ans:-Understandable

3.How does visualization of big data help in interpreting information?

Ans:-clear

4.What is the purpose of using a dashboard for data visualization?

Ans:-comm

Problem -2

 Problem Statement:

Arpasland has surrounded by attackers. A truck enters the city. The driver claims the load is food and medicine from Iranians. Ali is one of the soldiers in Arpasland. He doubts about the truck, maybe it's from the siege. He knows that a tag is valid if the sum of every two consecutive digits of it is even and its letter is not a vowel. Determine if the tag of the truck is valid or not.

We consider the letters "A","E","I","O","U","Y" to be vowels for this problem.

Problem - 1

 Problem Statement:

You are required to enter a word that consists of  and  that denote the number of Zs and Os respectively. The input word is considered similar to word zoo if .

Determine if the entered word is similar to word zoo.

For example, words such as zzoooo and zzzoooooo are similar to word zoo but not the words such as zzooo and zzzooooo.

SageMaker - Amazon ML MCQ's

1.  Asynchronous Predictions are possible in SageMaker through _________________.

   View Answer   

   BatchTranform



2. Training Data for SageMaker models is ___________________.

   View Answer   

   Stored in S3



3. Which of the following algorithms is best suited for detecting malicious server activity?

   View Answer   

   IP



4. Hyperparameters are _______________________.

   View Answer   

   Model-specific parameters which are preset before training



Aptitude Questions - 1

1. The average weight of 8 person's increases by 2.5 kg when a new person comes in place of one of them weighing 65 kg. What might be the weight of the new person?

   View Answer   

   85kg



2. The difference between a two-digit number and the number obtained by interchanging the digits is 36. What is the difference between the sum and the difference of the digits of the number if the ratio between the digits of the number is 1 : 2 ?

   View Answer   

   8



3. Three candidates contested an election and received 1136, 7636 and 11628 votes respectively. What percentage of the total votes did the winning candidate get?

   View Answer   

   57%



4. In a certain store, the profit is 320% of the cost. If the cost increases by 25% but the selling price remains constant, approximately what percentage of the selling price is the profit?

   View Answer   

   70%



Overfitting & Underfitting in Machine Learning

 

Overfitting in Machine Learning

Overfitting refers to a model that models the training data too well.

Overfitting happens when a model learns the detail and noise in the training data to the extent that it negatively impacts the performance of the model on new data. This means that the noise or random fluctuations in the training data is picked up and learned as concepts by the model. The problem is that these concepts do not apply to new data and negatively impact the models ability to generalize.