Accenture
50+ NPB CONSULTANTS Interview Questions and Answers
Q1. What do you understand by Budgeting and Forecasting?
Budgeting and forecasting involve the process of planning and estimating future financial outcomes.
Budgeting is the process of creating a detailed plan for income and expenses over a specific period.
Forecasting involves predicting future financial performance based on historical data and market trends.
Budgeting helps in setting financial goals, allocating resources, and monitoring financial performance.
Forecasting assists in making informed decisions, identifying potential ri...read more
Q2. What type of forecasting method you apply for forecasting?
I apply various forecasting methods depending on the data and the context of the problem.
I use time series analysis for data with a clear trend and seasonality.
I use regression analysis for data with multiple predictors.
I use machine learning algorithms such as random forest and neural networks for complex data.
I also consider qualitative factors such as expert opinions and market trends.
I continuously evaluate and refine the forecasting method based on the accuracy of the pr...read more
Q3. What do you understand by Accruals?
Accruals are expenses or revenues that have been recognized but not yet paid or received.
Accruals are a part of accrual accounting, which recognizes transactions when they occur, not when money changes hands.
Accruals can include expenses like salaries, interest, and taxes, as well as revenues like sales and services rendered.
Accruals are recorded as journal entries, with a corresponding debit and credit to the appropriate accounts.
Examples of accruals include unpaid salaries ...read more
Q4. In which scenario we book credit balance for prepaid expenses?
Credit balance for prepaid expenses is booked when the amount paid exceeds the expense incurred.
Credit balance is booked when the prepaid expense is cancelled or reduced.
This can happen when the service is not fully utilized or the contract is terminated early.
Example: Prepaid rent for a year is paid in advance but the tenant moves out after 6 months.
Example: Prepaid insurance premium is cancelled before the policy period ends.
The credit balance is recorded as a liability on ...read more
Q5. How will you search for content in a pool of resources
I would use a combination of search filters, keywords, and metadata to efficiently search for relevant content.
Identify the specific pool of resources and their organization
Use search filters such as date, author, and type of content
Utilize relevant keywords and synonyms
Take advantage of metadata such as tags and descriptions
Consider the context and purpose of the search
Refine the search based on initial results
Q6. 1. What are the main components of CAM(MSME etc)?.
CAM (MSME etc) has components like financial assistance, technology upgradation, marketing support, and skill development.
Financial assistance: loans, subsidies, grants, etc.
Technology upgradation: modernization of machinery, equipment, etc.
Marketing support: promotion, branding, advertising, etc.
Skill development: training, workshops, seminars, etc.
Examples: MSME has schemes like Credit Guarantee Fund Trust for Micro and Small Enterprises, Prime Minister's Employment Generat...read more
Q7. 2. How do you access risk in any project?
Risk assessment involves identifying potential risks and evaluating their likelihood and impact on the project.
Identify potential risks and their impact on the project
Evaluate the likelihood of each risk occurring
Assess the severity of the impact of each risk
Develop a risk management plan to mitigate or avoid identified risks
Regularly review and update the risk management plan throughout the project
Q8. How ur development resolve the client’s problems
Our development team resolves client problems by analyzing requirements, designing solutions, and implementing them effectively.
Analyze client requirements thoroughly to understand the root cause of the problem
Design customized solutions that address the specific needs of the client
Implement solutions efficiently and effectively to resolve the client's problems
Provide ongoing support and maintenance to ensure the solution continues to meet the client's needs
Q9. How to create Changes only extra.
To create Changes only extra, identify existing changes and add new ones without modifying the existing ones.
Identify existing changes
Add new changes without modifying existing ones
Ensure new changes do not conflict with existing ones
Document all changes made
Q10. How to create balance group and usages
Balance groups can be created by analyzing usage patterns and grouping similar items together.
Analyze usage patterns to identify similar items
Group similar items together to create balance groups
Consider factors such as frequency of use and importance of items in the group
Examples include grouping similar products in a store or grouping tasks by priority in a to-do list
Q11. What is your company manufacturing
We manufacture electronic devices for home and office use.
Our products include smart home devices, routers, and printers.
We focus on creating user-friendly and innovative technology.
Our devices are designed to improve productivity and simplify daily tasks.
We also offer customer support and maintenance services.
Examples of our products include smart thermostats, wireless speakers, and all-in-one printers.
Q12. What are the steps involved in setting up failover clustering?
Setting up failover clustering involves several steps to ensure high availability and reliability of systems.
Install the Failover Clustering feature on all servers that will participate in the cluster.
Configure shared storage for the cluster, such as a SAN or NAS.
Create a cluster by running the Failover Cluster Manager and following the wizard to add servers to the cluster.
Configure cluster networks and assign IP addresses for the cluster and each node.
Install and configure c...read more
Q13. What is Procurement process
Procurement process is the series of steps involved in acquiring goods or services from external sources.
Identifying the need for goods or services
Developing specifications
Identifying potential suppliers
Evaluating and selecting suppliers
Negotiating contracts
Placing orders
Receiving and inspecting goods or services
Processing invoices and making payments
Q14. What are different OOP features
OOP features include encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: Bundling data and methods that operate on the data into a single unit (class).
Inheritance: Allows a class to inherit properties and behavior from another class.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation details and showing only the necessary features.
Q15. What do know about business analyst on banking and insurance.
Business analysts in banking and insurance focus on analyzing financial data, identifying trends, and improving operational efficiency.
Analyze financial data to identify trends and make recommendations for improvement
Work closely with stakeholders to understand business needs and requirements
Develop and implement strategies to improve operational efficiency and reduce costs
Ensure compliance with regulations and industry standards
Use data analytics tools and techniques to supp...read more
Q16. What is the process you follow in budgeting
I follow a structured process that involves analyzing past spending, setting goals, and creating a detailed plan.
Analyze past spending to identify areas where costs can be reduced
Set clear goals for the budget, such as reducing expenses or increasing revenue
Create a detailed plan that includes specific targets and timelines
Regularly review and adjust the budget as needed
Communicate the budget to relevant stakeholders, such as department heads or executives
Q17. How to handle multiple window in selenium?
Handling multiple windows in Selenium involves switching between windows and performing actions on each window.
Use getWindowHandles() to get all window handles
Switch to a specific window using switchTo().window(handle)
Perform actions on the window
Close the window or switch back to the original window
Q18. What is swift 563, 564 588 and corp in detail
Swift 563, 564, 588 are message types used in financial transactions. Corp refers to corporate payments.
Swift 563 is used for requesting a payment order
Swift 564 is used for acknowledging a payment order
Swift 588 is used for a request to cancel a payment order
Corp refers to corporate payments made by a company to its suppliers or employees
Q19. What is the process of SQL Server Always On?
SQL Server Always On is a high availability and disaster recovery solution that provides redundancy and failover capabilities.
SQL Server Always On is a feature in SQL Server that provides high availability and disaster recovery solutions.
It allows for automatic failover between multiple replicas to ensure minimal downtime.
There are two types of Always On configurations: Always On Failover Cluster Instances (FCI) and Always On Availability Groups (AG).
FCI provides redundancy a...read more
Q20. How to initialize an array
An array can be initialized by declaring the array variable and assigning values within curly braces.
Declare the array variable with the data type and square brackets, e.g. String[] arrayName;
Initialize the array by assigning values within curly braces, e.g. arrayName = new String[] {"value1", "value2", "value3"};
Alternatively, you can combine declaration and initialization in one line, e.g. String[] arrayName = {"value1", "value2", "value3"};
Q21. What are external internal tables in hive?
External and internal tables in Hive are two types of tables used to store data in Hive.
External tables store data outside of Hive's warehouse directory, while internal tables store data within the warehouse directory
External tables do not delete data when the table is dropped, while internal tables delete data
External tables are useful for sharing data between different Hive instances or with external systems
Internal tables are managed by Hive, while external tables are mana...read more
Q22. What are internal and external tables in hive?
Internal and external tables in Hive are two types of tables used to store data in Hive.
Internal tables store data in a default location managed by Hive
External tables store data in a location specified by the user
Internal tables are deleted when the table is dropped, while external tables retain data in the specified location
Example: CREATE TABLE internal_table (col1 INT, col2 STRING) STORED AS ORC;
Example: CREATE EXTERNAL TABLE external_table (col1 INT, col2 STRING) LOCATIO...read more
Q23. Types of users in the SAP system? Difference between them
Types of users in SAP system include end users, power users, and administrators.
End users: Regular users who perform day-to-day transactions in the system.
Power users: Users with advanced knowledge who can perform more complex tasks and configurations.
Administrators: Users responsible for managing the system, setting up security, and maintaining the system.
Difference: End users primarily use the system for transactions, power users have more advanced capabilities, and adminis...read more
Q24. What are the Pyramids of matrix
Pyramids of matrix refer to the hierarchical structure of a matrix organization.
The pyramids represent the levels of authority and decision-making within the organization.
The higher up the pyramid, the more power and responsibility the individual holds.
Examples include CEO at the top, followed by executives, managers, and then employees.
The pyramids can vary in size and complexity depending on the organization's structure.
They can also be used to visualize the flow of communi...read more
Q25. Please explain difference between group by and having
Group by is used to group rows that have the same values into summary rows, while having is used to filter groups based on a specified condition.
Group by is used with aggregate functions to group rows based on one or more columns.
Having is used to filter groups based on a specified condition after the group by clause.
Example: SELECT department, AVG(salary) FROM employees GROUP BY department HAVING AVG(salary) > 50000;
Q26. Technical concept of technology u used and worked on
I have worked on the technical concept of machine learning algorithms.
Implemented and optimized various machine learning algorithms such as linear regression, decision trees, and support vector machines.
Utilized Python libraries like scikit-learn and TensorFlow for implementing and training machine learning models.
Worked on feature engineering techniques to extract relevant information from raw data.
Performed model evaluation and validation using techniques like cross-validat...read more
Q27. What is the use of SQL commands
SQL commands are used to interact with databases by performing various operations such as querying, updating, inserting, and deleting data.
SQL commands are used to retrieve data from databases using SELECT statement.
SQL commands can be used to update existing data in a database using UPDATE statement.
SQL commands can be used to insert new data into a database using INSERT statement.
SQL commands can be used to delete data from a database using DELETE statement.
Q28. What real tile experianxe you ha either
I have over 5 years of experience working as a Senior Analyst in the financial industry.
Led a team in analyzing market trends and making investment recommendations
Developed complex financial models to forecast company performance
Presented findings to senior management and clients
Managed large datasets and conducted in-depth research on industry sectors
Q29. Different between Secured View and Table
Secured View and Table are two different ways of presenting data.
Secured View is a restricted view of data that only shows certain information to certain users.
Table is a way of presenting data in a structured format with rows and columns.
Secured View is used to protect sensitive information from unauthorized access.
Table is used to organize and display data in a clear and concise manner.
Secured View can be customized to show different information to different users based on ...read more
Q30. Different data types in JAVA
Different data types in JAVA include primitive types (int, double, boolean), reference types (String, Object), and arrays.
Primitive types: int, double, boolean
Reference types: String, Object
Arrays: int[], String[]
Q31. What company value you possess?
I possess the company value of integrity, always prioritizing honesty and ethical behavior in my work.
Consistently making decisions based on ethical principles
Being transparent and honest in all communications
Maintaining confidentiality when necessary
Acting in the best interest of the company and its stakeholders
Setting a positive example for others to follow
Q32. What is action filter in c#
Action filter in C# is a custom attribute that can be applied to controller actions to perform logic before or after the action is executed.
Action filters can be used for logging, authorization, caching, etc.
Examples include AuthorizeAttribute for authorization and OutputCacheAttribute for caching.
They implement IActionFilter, IResultFilter, IExceptionFilter, or IAuthorizationFilter interfaces.
Q33. Different between extract and bip
Extract is a process of retrieving data from a source system, while BIP is a tool used for creating and managing reports.
Extract involves pulling data from a source system and storing it in a separate location for analysis or reporting.
BIP is a tool used for creating and managing reports, which can be based on data extracted from a source system.
Extract is typically a one-time process, while BIP can be used to generate reports on a regular basis.
Examples of extract tools incl...read more
Q34. Hard assert and soft assert difference
Hard assert is a mandatory step that stops the execution if failed, while soft assert is a non-mandatory step that continues execution even if failed.
Hard assert is used to validate critical checkpoints in the code, while soft assert is used for non-critical checkpoints.
Hard assert throws an exception and stops the execution if failed, while soft assert logs the failure but continues the execution.
Hard assert is typically used for validating essential elements like login func...read more
Q35. What is Variance analysis
Variance analysis is a technique used to compare actual performance to planned performance.
It involves identifying and analyzing the differences between planned and actual results.
It helps in identifying the reasons for the differences and taking corrective actions.
It is commonly used in budgeting and financial analysis.
Example: If a company planned to sell 1000 units of a product but only sold 800, variance analysis would help identify the reasons for the shortfall.
Example: ...read more
Q36. Diamond problem in java
Diamond problem in Java occurs when a class inherits from two classes that have a common ancestor.
Diamond problem arises in multiple inheritance scenarios in Java
It occurs when a class inherits from two classes that have a common ancestor
Java does not support multiple inheritance to avoid the diamond problem
Q37. Different types of Corporate Actions
Corporate actions are events initiated by a company that can affect the stock price and shareholder value.
Types of corporate actions include stock splits, dividends, mergers and acquisitions, spin-offs, and rights issues.
Stock splits involve dividing existing shares into multiple shares to increase liquidity and affordability.
Dividends are payments made to shareholders from a company's profits.
Mergers and acquisitions involve the consolidation of two or more companies.
Spin-of...read more
Q38. memory management in depth in Java
Memory management in Java involves automatic memory allocation and garbage collection.
Java uses automatic memory management through garbage collection to allocate and deallocate memory.
Garbage collection in Java helps in reclaiming memory occupied by objects that are no longer in use.
Java Virtual Machine (JVM) manages memory allocation and deallocation for Java programs.
Memory leaks can occur in Java if objects are not properly dereferenced, leading to inefficient memory usag...read more
Q39. write python code to reverse the string
Python code to reverse a string
Use string slicing with a step of -1 to reverse the string
Alternatively, use the built-in 'reversed' function to reverse the string
Convert the string to a list, reverse the list, then join the list back into a string
Q40. what is middleware in .net
Middleware in .NET is software that acts as a bridge between an application and the operating system, enabling communication and data exchange.
Middleware helps in handling communication between different components of an application.
It provides services such as authentication, logging, caching, and error handling.
Examples of middleware in .NET include ASP.NET Core middleware for request processing and OWIN middleware for authentication.
Middleware can be added to the applicati...read more
Q41. what is incident Life cycle
Incident life cycle refers to the stages an incident goes through from detection to resolution.
Detection: Incident is identified or reported.
Analysis: Incident is investigated to determine cause and impact.
Response: Actions are taken to mitigate the incident.
Resolution: Incident is resolved and closed.
Post-Incident Review: Lessons learned are documented for future prevention.
Q42. What are window function
Window functions are a type of function in SQL that perform calculations across a set of table rows related to the current row.
Window functions are used to perform calculations on a set of rows related to the current row.
They allow you to perform calculations without grouping the rows into a single output row.
Examples of window functions include ROW_NUMBER(), RANK(), and NTILE().
Q43. P2P cycle and integration of p2p with fi
P2P cycle refers to procure-to-pay process, which involves purchasing goods/services and paying for them. Integration of P2P with FI (financial institution) streamlines financial transactions.
P2P cycle involves requisitioning, purchasing, receiving, and paying for goods/services.
Integration of P2P with FI automates payment processes, improves accuracy, and enhances financial visibility.
Examples of P2P integration with FI include electronic invoicing, automated payment approva...read more
Q44. scope of beans in spring boot
Beans in Spring Boot are objects managed by the Spring IoC container.
Beans are Java objects that are instantiated, assembled, and managed by the Spring IoC container.
Beans are defined in the Spring configuration file or using annotations like @Component, @Service, @Repository, or @Controller.
Beans can be scoped as singleton, prototype, request, session, or custom scopes.
Example: @Component annotation marks a class as a Spring bean.
Q45. What is forwardRef
forwardRef is a function in React that allows you to access a child component's instance before it is rendered.
Used for accessing child component's instance before it is rendered
Helps in resolving circular dependencies in components
Commonly used in higher-order components and custom hooks
Q46. What os star schema
Star schema is a type of data warehouse schema where a central fact table is connected to multiple dimension tables.
Central fact table contains the primary data of interest
Dimension tables provide context and details about the data in the fact table
Each dimension table is connected to the fact table through a foreign key
Allows for efficient querying and analysis of data
Q47. Destils sbout psdt project
The PSDT project is a strategic initiative aimed at improving efficiency and effectiveness in our operations.
The PSDT project focuses on streamlining processes and reducing costs.
It involves implementing new technologies and tools to enhance productivity.
The project aims to optimize resource allocation and improve decision-making.
Examples: implementing a new CRM system, restructuring supply chain processes.
Q48. What is Component.js
Component.js is a JavaScript library used for building web components.
Component.js is a lightweight library for creating reusable web components.
It allows developers to encapsulate HTML, CSS, and JavaScript into custom elements.
These custom elements can then be easily reused across different web pages or applications.
Component.js simplifies the process of creating modular and maintainable front-end code.
Q49. Previous process explanation
I will explain the previous process followed in my role as a Senior Analyst.
The previous process involved gathering data from multiple sources.
Analyzing the data to identify trends and patterns.
Creating reports and presentations to communicate findings to stakeholders.
Collaborating with team members to ensure accuracy and completeness of analysis.
Q50. Details of 401k service
401k service is a retirement savings plan sponsored by an employer that allows employees to save and invest a portion of their paycheck before taxes.
Employer-sponsored retirement savings plan
Allows employees to save and invest a portion of their paycheck before taxes
May include employer matching contributions
Contributions are typically invested in a variety of mutual funds or other investment options
Q51. Reason for switching
Seeking new challenges and opportunities for growth in a different environment.
Looking for new challenges and opportunities to grow professionally
Interested in exploring different industries or sectors
Seeking a change in work culture or environment
Want to broaden skill set and knowledge base
Desire for career advancement or higher salary potential
Q52. Tools worked on
I have experience working with tools such as Tableau, SQL, Excel, and Python for data analysis.
Tableau for data visualization
SQL for querying databases
Excel for data manipulation
Python for scripting and automation
Q53. Bad debt explain
Bad debt refers to money owed to a company that is unlikely to be recovered.
Bad debt occurs when a customer fails to pay their outstanding balance.
It can result from customers declaring bankruptcy or simply refusing to pay.
Companies may write off bad debts as a loss on their financial statements.
Bad debt can impact a company's cash flow and profitability.
Examples include unpaid invoices, defaulted loans, and bounced checks.
More about working at Accenture
Top HR Questions asked in NPB CONSULTANTS
Interview Process at NPB CONSULTANTS
Top Senior Analyst Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month