Add office photos
Engaged Employer

AB InBev India

3.4
based on 1.2k Reviews
Video summary
Filter interviews by

50+ Convergent Technology Solutions Pvt Ldt Interview Questions and Answers

Updated 17 Jan 2025

Q1. How did you prevent your model from overfitting ? What did you do when it was underfit ?

Ans.

To prevent overfitting, I used techniques like regularization, cross-validation, and early stopping. For underfitting, I tried increasing model complexity and adding more features.

  • Used regularization techniques like L1 and L2 regularization to penalize large weights

  • Used cross-validation to evaluate model performance on different subsets of data

  • Used early stopping to prevent the model from continuing to train when performance on validation set stops improving

  • For underfitting, ...read more

Add your answer

Q2. Why was this model/ approach used instead of others ?

Ans.

The model/approach was chosen based on its accuracy, interpretability, and scalability.

  • The chosen model/approach had the highest accuracy compared to others.

  • The chosen model/approach was more interpretable and easier to explain to stakeholders.

  • The chosen model/approach was more scalable and could handle larger datasets.

  • Other models/approaches were considered but did not meet the requirements or had limitations.

  • The chosen model/approach was also more suitable for the specific ...read more

Add your answer

Q3. What approach did you use and why ?

Ans.

I used a combination of supervised and unsupervised learning approaches to analyze the data.

  • I used supervised learning to train models for classification and regression tasks.

  • I used unsupervised learning to identify patterns and relationships in the data.

  • I also used feature engineering to extract relevant features from the data.

  • I chose this approach because it allowed me to gain insights from the data and make predictions based on it.

Add your answer

Q4. How would you distribute 1 million? (for the company)

Ans.

I would allocate the funds towards expanding our digital marketing efforts, improving our sales team's training, and investing in customer retention strategies.

  • Allocate $500,000 towards expanding our digital marketing efforts, including social media advertising and search engine optimization.

  • Invest $250,000 in improving our sales team's training and development, including workshops and coaching sessions.

  • Allocate $250,000 towards customer retention strategies, such as loyalty ...read more

View 1 answer
Discover Convergent Technology Solutions Pvt Ldt interview dos and don'ts from real experiences

Q5. Explain chi square distribution. What are the assumptions involved?

Ans.

Chi square distribution is a probability distribution used in statistical tests to determine the significance of relationships between categorical variables.

  • Chi square distribution is a continuous probability distribution that is used in statistical tests such as the chi square test.

  • It is skewed to the right and its shape is determined by the degrees of freedom.

  • Assumptions involved in chi square distribution include: random sampling, independence of observations, and expected...read more

Add your answer

Q6. Compare 3x3 tables with some patterns on it, choose the tables which are exactly similar, also a game with many levels.

Ans.

Comparing 3x3 tables with patterns to find exact similarities.

  • Look for identical patterns in each table

  • Check for symmetry or rotation invariance

  • Pay attention to the position of elements in the tables

Add your answer
Are these interview questions helpful?

Q7. How to obtain a sync between Dataverse and SQL database to show real time updates?

Ans.

To obtain a sync between Dataverse and SQL database for real-time updates, you can use change tracking, triggers, or a data integration platform.

  • Enable change tracking in the SQL database to track modifications

  • Create triggers in the SQL database to capture changes and update Dataverse

  • Utilize a data integration platform like Azure Data Factory or SSIS to synchronize data in real-time

  • Implement a custom solution using APIs and webhooks to push updates between Dataverse and SQL d...read more

Add your answer

Q8. What is the difference between DAX and Power Query?

Ans.

DAX is a formula language used in Power BI and Power Pivot for data analysis and calculations. Power Query is a data transformation and shaping tool.

  • DAX is used for creating custom calculations and measures in Power BI and Power Pivot.

  • Power Query is used for importing, transforming, and cleaning data from various sources.

  • DAX is a formula language similar to Excel formulas, but with additional functions and capabilities.

  • Power Query has a graphical interface for data transforma...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Choose the odd shape/color combination out of many present on the screen, also a game with many levels.

Ans.

The odd shape/color combination out of many present on the screen can be identified by looking for a shape that does not match the others in terms of color or design.

  • Look for a shape that stands out in terms of color compared to the rest

  • Identify any patterns or similarities among the shapes to determine the odd one out

  • Consider the overall design and symmetry of the shapes to find the outlier

Add your answer

Q10. Deep dive into clustering and bagging boosting algorithms

Ans.

Clustering and bagging boosting algorithms are popular techniques in machine learning for grouping data points and improving model accuracy.

  • Clustering algorithms like K-means, DBSCAN, and hierarchical clustering are used to group similar data points together based on certain criteria.

  • Bagging algorithms like Random Forest create multiple subsets of the training data and train individual models on each subset, then combine their predictions to improve accuracy.

  • Boosting algorith...read more

Add your answer

Q11. What are your daily tasks, Why do you want to change, What is forecasting, What is budgeting, walk me through your resume

Ans.

My daily tasks include financial analysis, forecasting, budgeting, and reporting. I want to change for career growth opportunities.

  • Daily tasks involve analyzing financial data, creating forecasts, developing budgets, and preparing reports

  • I want to change for opportunities to further develop my skills and advance my career

  • Forecasting is the process of predicting future financial outcomes based on historical data and trends

  • Budgeting involves setting financial goals and allocati...read more

Add your answer

Q12. Guesstimate to calculate number of bars in Lucknow.

Ans.

Approximately 5000 bars in Lucknow based on population and market demand.

  • Consider population density and demographics

  • Analyze the number of restaurants and nightlife establishments

  • Research the alcohol consumption rate in the city

  • Factor in the tourism industry and events that attract visitors

  • Assume an average of 1 bar per 1000 people

  • Approximately 3-4 bars per square kilometer in urban areas

Add your answer

Q13. What do you know about Power Platform?

Ans.

Power Platform is a collection of Microsoft tools that enable users to build business solutions without extensive coding.

  • Power Platform consists of Power Apps, Power Automate, Power BI, and Power Virtual Agents.

  • Power Apps allows users to create custom apps using a visual interface.

  • Power Automate enables users to automate workflows and integrate different systems and services.

  • Power BI is a business analytics tool that provides interactive visualizations and reports.

  • Power Virtu...read more

Add your answer

Q14. what is difference active attack and passive attack

Ans.

Active attacks involve the attacker directly interacting with the target system, while passive attacks involve monitoring and eavesdropping.

  • Active attacks involve modifying data, injecting malware, or disrupting services.

  • Passive attacks involve listening in on communications, capturing data, or analyzing traffic.

  • Examples of active attacks include denial of service (DoS) attacks and man-in-the-middle attacks.

  • Examples of passive attacks include sniffing attacks and reconnaissan...read more

Add your answer

Q15. What do you understand from (certain charts shown by me in visualization)

Ans.

Understanding various types of charts and their significance in data visualization.

  • Different types of charts convey different types of information (e.g. bar charts for comparisons, line charts for trends)

  • Charts can help identify patterns, outliers, and relationships in data

  • Understanding the axes, labels, and legends in a chart is crucial for interpretation

Add your answer

Q16. What are the 10 principles of the company?

Ans.

Our company has 10 principles that guide our actions and decisions.

  • Integrity and honesty in all dealings

  • Respect for diversity and inclusion

  • Commitment to excellence and continuous improvement

  • Customer satisfaction as top priority

  • Innovation and creativity in all aspects of business

  • Environmental responsibility and sustainability

  • Employee empowerment and development

  • Community involvement and social responsibility

  • Transparency and accountability

  • Financial stability and profitability

Add your answer

Q17. What is Azure Front Door & Application Gateway?

Ans.

Azure Front Door is a global, scalable entry-point that uses the Microsoft global network to create fast, secure, and highly available web applications. Application Gateway is a web traffic load balancer that enables you to manage traffic to your web applications.

  • Azure Front Door provides SSL offloading, URL-based routing, and global load balancing.

  • Application Gateway offers features like SSL termination, cookie-based session affinity, and URL path-based routing.

  • Both services...read more

Add your answer

Q18. Journal entry for loss of inventory by fire and insurance claiming for inventory loss

Ans.

Journal entry for inventory loss due to fire and insurance claim

  • Debit Inventory account for the value of inventory lost due to fire

  • Credit Insurance Claim Receivable account for the amount claimed from insurance

  • Debit Insurance Claim Receivable account for any deductible or unrecovered amount

  • Credit Loss on Inventory account for the difference between inventory value and insurance claim

  • Ensure to include detailed descriptions for each entry

Add your answer

Q19. Design an architecture to implement application in Azure?

Ans.

Designing an architecture to implement an application in Azure involves creating a scalable and secure environment for the application to run efficiently.

  • Utilize Azure App Services for hosting web applications

  • Implement Azure SQL Database for data storage

  • Use Azure Functions for serverless computing

  • Utilize Azure Blob Storage for file storage

  • Implement Azure Active Directory for authentication and access control

Add your answer

Q20. Underlying process of boosting and Decision tree

Ans.

Boosting is an ensemble learning technique that combines multiple weak learners to create a strong learner, often using decision trees.

  • Boosting is an iterative process where each weak learner is trained to correct the errors of the previous ones.

  • Decision trees are commonly used as the base learner in boosting algorithms like AdaBoost and Gradient Boosting.

  • Boosting algorithms like XGBoost and LightGBM are popular in machine learning for their high predictive accuracy.

Add your answer

Q21. Explain different clustering algorithms

Ans.

Clustering algorithms group similar data points together based on certain criteria.

  • K-means: partitions data into K clusters based on centroids

  • Hierarchical clustering: creates a tree of clusters

  • DBSCAN: density-based clustering algorithm

  • Mean Shift: shifts centroids to maximize data points within a certain radius

  • Gaussian Mixture Models: assumes data points are generated from a mixture of Gaussian distributions

Add your answer

Q22. Share examples of how you question status quo

Ans.

I always question the status quo to identify areas of improvement and innovation.

  • I encourage my team to challenge assumptions and think outside the box

  • I regularly review processes and procedures to identify inefficiencies

  • I seek feedback from employees and stakeholders to gain different perspectives

  • I am open to trying new approaches and technologies to improve HR operations

  • For example, I implemented a new performance management system that replaced the traditional annual revie...read more

Add your answer

Q23. What is booting process in Linux?

Ans.

The booting process in Linux is the sequence of steps that occur when a computer system is powered on or restarted.

  • BIOS/UEFI firmware is loaded first

  • Bootloader (GRUB, LILO) is loaded next

  • Kernel is loaded into memory

  • Init process is started

  • System services and user space applications are initialized

Add your answer

Q24. Guesstimate the number of bars in Lucknow.

Ans.

There are approximately 5000 bars in Lucknow.

  • The number of bars in a city depends on various factors such as population, culture, and economy.

  • Lucknow is a large city with a population of over 3 million people.

  • Considering the city's size and culture, it is safe to assume that there are around 5000 bars in Lucknow.

  • This estimate is based on the assumption that there is one bar for every 600 people in the city.

Add your answer

Q25. Guesstimate: Number of Bars in Lucknow.

Ans.

There are approximately 500 bars in Lucknow.

  • The number of bars in a city is usually proportional to its population.

  • Lucknow has a population of around 3 million people.

  • Assuming 1 bar for every 6,000 people, there would be around 500 bars in Lucknow.

  • This estimation may vary depending on factors such as culture, economy, and regulations.

Add your answer

Q26. how do you check the consistency of cells

Ans.

To check the consistency of cells, you can compare the values in the cells and look for any discrepancies or errors.

  • Compare the values in the cells to ensure they are consistent and accurate.

  • Check for any discrepancies or errors in the data entered in the cells.

  • Verify that the formulas or calculations in the cells are correct and producing the expected results.

  • Use data validation techniques to ensure that the cells contain the appropriate data types or values.

  • Perform regular ...read more

Add your answer

Q27. Phishing attempt detection and mitigation process.

Ans.

Phishing attempt detection involves identifying suspicious emails and links, educating users, and implementing security measures.

  • Train employees to recognize phishing emails and suspicious links

  • Use email filtering tools to detect and block phishing attempts

  • Implement multi-factor authentication to prevent unauthorized access

  • Regularly update security software and patches to protect against known vulnerabilities

Add your answer

Q28. Journal entries for provision for bad debt

Ans.

Journal entries for provision for bad debt involve debiting bad debt expense and crediting allowance for doubtful accounts.

  • Debit bad debt expense to recognize the expense on the income statement

  • Credit allowance for doubtful accounts to reduce the value of accounts receivable on the balance sheet

  • Adjust the provision based on estimated bad debts using aging analysis or percentage of sales method

Add your answer

Q29. mean median mode on distribution curve

Ans.

Mean, median, and mode are measures of central tendency on a distribution curve.

  • Mean is the average of all the values in the distribution.

  • Median is the middle value when the data is arranged in ascending order.

  • Mode is the value that appears most frequently in the distribution.

  • For example, in a distribution of [2, 3, 3, 4, 5], the mean is 3.4, the median is 3, and the mode is 3.

Add your answer

Q30. Pitch yourself in 30 seconds.

Ans.

I am a highly motivated sales and marketing professional with a proven track record of exceeding targets.

  • Experienced in developing and executing successful sales strategies

  • Skilled in building and maintaining strong customer relationships

  • Proficient in market research and analysis

  • Excellent communication and negotiation skills

  • Consistently achieved or exceeded sales targets in previous roles

Add your answer

Q31. How the cyber hub security fabric maintained

Ans.

The cyber hub security fabric is maintained through a combination of technology, policies, procedures, and monitoring.

  • Regular security audits and assessments are conducted to identify vulnerabilities and risks.

  • Firewalls, intrusion detection systems, and encryption technologies are implemented to protect data and systems.

  • Access controls and authentication mechanisms are used to ensure only authorized users have access to sensitive information.

  • Security policies and procedures a...read more

Add your answer

Q32. How good with the latest Ticketing Tools

Ans.

I am proficient in using the latest ticketing tools.

  • I have experience using tools such as Zendesk, Freshdesk, and Jira Service Desk.

  • I am able to efficiently manage and prioritize tickets to ensure timely resolution.

  • I am familiar with creating and customizing reports to track ticket metrics.

  • I am constantly learning and staying up-to-date with the latest ticketing tools and features.

Add your answer

Q33. How can sale increase by Hayward?

Ans.

Sales can be increased by Hayward through targeted marketing campaigns, expanding distribution channels, and offering promotions.

  • Implement targeted marketing campaigns to reach specific customer segments

  • Expand distribution channels to reach new markets and increase accessibility

  • Offer promotions such as discounts, bundles, or loyalty programs to attract new customers and retain existing ones

Add your answer

Q34. How many types of pumps

Ans.

There are several types of pumps used in various industries and applications.

  • Centrifugal pumps

  • Reciprocating pumps

  • Rotary pumps

  • Diaphragm pumps

  • Gear pumps

  • Peristaltic pumps

  • Piston pumps

  • Jet pumps

  • Submersible pumps

  • Screw pumps

Add your answer

Q35. What do you use to prioritize?

Ans.

I use a combination of data analysis, stakeholder input, and company goals to prioritize tasks and projects.

  • Analyze data to identify high-impact tasks

  • Consider input from stakeholders to understand priorities

  • Align prioritization with company goals and objectives

Add your answer

Q36. How do manage your plant

Ans.

I manage my plant by implementing effective communication, setting clear goals, and providing support to my team.

  • I prioritize effective communication to ensure everyone is on the same page and informed about any changes or updates.

  • I set clear goals and expectations for my team, ensuring they understand their roles and responsibilities.

  • I provide support and resources to my team, addressing any challenges they may face and helping them succeed.

  • I regularly assess performance and...read more

View 1 answer

Q37. explain man in the middle attack

Ans.

A man in the middle attack is when a hacker intercepts communication between two parties without their knowledge.

  • Occurs when a hacker secretly intercepts and possibly alters the communication between two parties

  • Commonly seen in public Wi-Fi networks where the hacker positions themselves between the user and the network

  • Can lead to sensitive information being stolen or manipulated

Add your answer

Q38. Librarires Used

Ans.

I have experience using libraries such as Pandas, NumPy, Scikit-learn, Matplotlib for data analysis and visualization.

  • Pandas for data manipulation

  • NumPy for numerical operations

  • Scikit-learn for machine learning algorithms

  • Matplotlib for data visualization

Add your answer

Q39. What is firewall?

Ans.

Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

  • Acts as a barrier between a trusted internal network and untrusted external network

  • Filters traffic based on rules set by network administrators

  • Can be hardware-based or software-based

  • Examples include Cisco ASA, Palo Alto Networks, and Windows Firewall

Add your answer

Q40. What is P value

Ans.

P value is a statistical measure that helps determine the significance of results in hypothesis testing.

  • P value is the probability of obtaining results at least as extreme as the observed results, assuming the null hypothesis is true.

  • A small P value (typically ≤ 0.05) indicates strong evidence against the null hypothesis, leading to its rejection.

  • Conversely, a large P value suggests weak evidence against the null hypothesis, leading to its acceptance.

  • P value is used in hypoth...read more

Add your answer

Q41. What you value most?

Ans.

I value continuous learning, collaboration, and customer satisfaction.

  • Continuous learning: I believe in constantly improving my skills and knowledge to stay ahead in the industry.

  • Collaboration: I value working with cross-functional teams to achieve common goals and foster innovation.

  • Customer satisfaction: I prioritize understanding and meeting the needs of customers to deliver products that exceed their expectations.

Add your answer

Q42. explain RSA and it is use

Ans.

RSA is a public-key encryption algorithm used for secure communication over the internet.

  • RSA stands for Rivest-Shamir-Adleman, named after its inventors.

  • It uses a pair of keys - a public key for encryption and a private key for decryption.

  • RSA is widely used in secure communication protocols like HTTPS for secure browsing.

  • It is based on the difficulty of factoring large prime numbers.

  • RSA keys are typically 1024 or 2048 bits in length for security.

Add your answer

Q43. Design pattern explain project

Ans.

Design patterns are reusable solutions to common problems in software design.

  • Design patterns help in creating flexible, maintainable, and scalable code.

  • Examples of design patterns include Singleton, Factory, Observer, and Strategy.

  • Each design pattern has a specific purpose and can be applied to different scenarios in software development.

Add your answer

Q44. What is planogramming ?

Ans.

Planogramming is the process of designing a visual representation of a store's products on shelves to maximize sales and customer experience.

  • Involves arranging products on shelves according to a pre-determined layout

  • Aims to optimize product placement for increased sales and improved customer navigation

  • Often includes considerations such as product size, color, and category

  • Commonly used in retail stores, supermarkets, and pharmacies

Add your answer

Q45. What I know ABI business.

Ans.

ABI business is a leading transportation planning and consulting firm specializing in sustainable and innovative solutions.

  • ABI business focuses on transportation planning and consulting services

  • They specialize in sustainable and innovative solutions

  • ABI business is known for their expertise in optimizing transportation systems

  • They work with clients to improve efficiency and reduce environmental impact

Add your answer

Q46. What do understand by TPM

Ans.

TPM stands for Total Productive Maintenance, a proactive approach to maintenance that aims to maximize equipment effectiveness.

  • TPM involves all employees in the maintenance process to prevent breakdowns and improve overall equipment efficiency.

  • It focuses on proactive maintenance, autonomous maintenance, and continuous improvement.

  • TPM aims to eliminate the 6 big losses in production: breakdowns, setup and adjustment, idling and minor stoppages, reduced speed, defects, and star...read more

Add your answer

Q47. explain security attacks

Ans.

Security attacks are malicious activities aimed at compromising the confidentiality, integrity, or availability of information.

  • Types of security attacks include malware, phishing, ransomware, DDoS attacks, and man-in-the-middle attacks.

  • Attackers may exploit vulnerabilities in software or systems to gain unauthorized access or steal sensitive data.

  • Common goals of security attacks are financial gain, data theft, disruption of services, or espionage.

  • Countermeasures to prevent se...read more

Add your answer

Q48. Forecasting in time series

Ans.

Forecasting in time series involves predicting future values based on past data.

  • Identify the trend, seasonality, and any outliers in the data

  • Choose an appropriate forecasting method such as ARIMA or exponential smoothing

  • Split the data into training and testing sets to evaluate the accuracy of the model

  • Adjust the model parameters and re-evaluate until satisfactory results are achieved

Add your answer

Q49. What is urs weakness

Ans.

I tend to take on too many tasks at once, leading to occasional overwhelm.

  • Strive to delegate tasks effectively to avoid becoming overwhelmed

  • Practice prioritizing tasks based on importance and deadlines

  • Seek support or guidance from colleagues or supervisors when feeling overwhelmed

Add your answer

Q50. Explain block chain

Ans.

Blockchain is a decentralized, distributed ledger technology that securely records transactions across multiple computers.

  • Blockchain is a chain of blocks containing transaction data.

  • Each block is linked to the previous one using cryptographic hashes.

  • Transactions are verified by network participants through consensus mechanisms like Proof of Work or Proof of Stake.

  • Once added to the blockchain, data is immutable and cannot be altered.

  • Examples of blockchain technology include Bi...read more

Add your answer

Q51. KPI handled in previous job.

Ans.

In my previous role, I handled KPIs related to on-time delivery, cost per mile, and driver retention.

  • On-time delivery: Ensuring shipments arrive at their destinations on schedule.

  • Cost per mile: Monitoring and optimizing transportation costs per mile traveled.

  • Driver retention: Implementing strategies to retain and motivate drivers to reduce turnover.

Add your answer

Q52. Automation challenges

Ans.

Automation challenges include tool selection, maintenance, scalability, and test data management.

  • Tool selection: Choosing the right automation tool based on project requirements and team expertise.

  • Maintenance: Ensuring scripts are updated to reflect changes in the application.

  • Scalability: Handling large test suites and integrating with continuous integration systems.

  • Test data management: Generating and maintaining test data for different scenarios.

Add your answer

Q53. 10 principle of ABI

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Convergent Technology Solutions Pvt Ldt

based on 104 interviews
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.0
 • 284 Interview Questions
3.7
 • 180 Interview Questions
4.2
 • 146 Interview Questions
3.9
 • 140 Interview Questions
4.3
 • 138 Interview Questions
View all
Top AB InBev India Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter