Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...



Software Design Interview Questions
Questions Answers Views Company eMail

Does UML guarantee project success?

Protech,

3 8922

Can we use UML for user interface (UI) design?

IBT, Protech,

3 10827

How to reverse engineer C++ code in UML?

Protech,

1 3649

UML: IS it a process, method or notation?

Protech,

3 8274

When do you prefer to use composition than aggregation?

InfoAxon Technologies, Protech,

1 6594

Does a concept HAVE to become a class in Design?

Protech,

1 3908

What are the good practices to use while designing for reuse?

Protech,

1 4393

Can you think of some nice examples where *multiple* actors are associated with a use case ?

Protech,

2 5191

How to use CRC Cards for Class Design?

Protech,

2 6745

What is the difference between static and dynamic Classificaition.Give some examples.

InfoAxon Technologies, Protech, Wipro,

1 5791

Explian following terms: Constraint Rules, Design by contract.

Protech,

1 4469

What is Object Constraint Language (OCL)?

Protech,

1 7573

Difference Between Attribute and Association.

Protech,

2 7684

What are associative classes?

InfoAxon Technologies, Protech,

3 7153

What are the different types of Design Patterns and Explain them?

Genpact, Gradatim, Gul Ahmed, TCS, Wipro,

3 53018


Un-Answered Questions { Software Design }

What all the major provisioning tools in devops ?

1


What is modeling? What are the advantages of creating a model?

1015


What is configuration management in terms of infrastructure and mention a few popular tools used?

1


How is chef used as a cm tool ?

1


Describe two-factor authentication?

5


You are a project manager working on contract with a company in a foreign country. At the project kick-off meeting, you are given an expensive-looking gift. The person who presented this to you said that it is customary in their country to give their business partners gifts. What is the most appropriate response? A. Thank them and decline. Explain that this is considered personal gain, which is unacceptable in your country. B. Thank them and accept. You don't believe there is a conflict of interest or an integrity issue at stake. C. Thank them and decline. Explain that this is considered a conflict of interest, which is unacceptable in your country. D. Thank them and accept since you know that it would be considered offensive to decline the gift in their culture. Immediately report the acceptance of the gift to the appropriate parties at your company so that your actions are not called into question later.

1279


Your project involves the research and development of a new food additive. You’re ready to release the product to your customer when you discover that a minor reaction might occur in people with certain conditions. The reactions to date have been very minor, and no known long-lasting side effects have been noted. As project manager you should: A. Do nothing because the reactions are so minor that very few people will be affected. B. Inform the customer that you've discovered this condition and tell them you'll research it further to determine the impacts. C. Inform your customer that there is no problem with the additive release the product to them. D. Tell the customer you'll correct the reaction problems in the next batch but you'll release the first batch of product to them now to begin using.

1173


What is UML diagram in C#?

1163


What is the difference between viewdata and viewbag?

1


Information-gathering techniques used in the Risk Identification process include all of the following except: A. Brainstorming B. Delphi technique C. Interviewing D. Kaizen technique

1147


Explain about a class?

1075


You work for a company that writes hilling software programs for the communication industry. You've just been assigned a new project. The customer is located in a distant country that limits the number of foreigners allowed into the country. You identify this risk in your risk management plan. The critical point during the project is installation and setup. You might do which of the following given these circumstances? A. Use a design of experiments technique to develop a contingency plan. B. Develop a cause-and-effect diagram that identifies the contract type you should use for a project like this. C. Use sensitivity analysis to assist you in developing the appropriate risk response for this situation. D. Develop a contingency plan for installation.

1110


Why is singleton bad?

1084


Explain continuous delivery.

1


What are the various components in sequence diagrams?

1042