Add office photos
Employer?
Claim Account for FREE

Accenture

3.9
based on 54.2k Reviews
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

50+ NPB CONSULTANTS Interview Questions and Answers

Updated 9 Jan 2025
Popular Designations

Q1. What do you understand by Budgeting and Forecasting?

Ans.

Budgeting and forecasting involve the process of planning and estimating future financial outcomes.

  • Budgeting is the process of creating a detailed plan for income and expenses over a specific period.

  • Forecasting involves predicting future financial performance based on historical data and market trends.

  • Budgeting helps in setting financial goals, allocating resources, and monitoring financial performance.

  • Forecasting assists in making informed decisions, identifying potential ri...read more

View 2 more answers

Q2. What type of forecasting method you apply for forecasting?

Ans.

I apply various forecasting methods depending on the data and the context of the problem.

  • I use time series analysis for data with a clear trend and seasonality.

  • I use regression analysis for data with multiple predictors.

  • I use machine learning algorithms such as random forest and neural networks for complex data.

  • I also consider qualitative factors such as expert opinions and market trends.

  • I continuously evaluate and refine the forecasting method based on the accuracy of the pr...read more

Add your answer

Q3. What do you understand by Accruals?

Ans.

Accruals are expenses or revenues that have been recognized but not yet paid or received.

  • Accruals are a part of accrual accounting, which recognizes transactions when they occur, not when money changes hands.

  • Accruals can include expenses like salaries, interest, and taxes, as well as revenues like sales and services rendered.

  • Accruals are recorded as journal entries, with a corresponding debit and credit to the appropriate accounts.

  • Examples of accruals include unpaid salaries ...read more

View 1 answer

Q4. In which scenario we book credit balance for prepaid expenses?

Ans.

Credit balance for prepaid expenses is booked when the amount paid exceeds the expense incurred.

  • Credit balance is booked when the prepaid expense is cancelled or reduced.

  • This can happen when the service is not fully utilized or the contract is terminated early.

  • Example: Prepaid rent for a year is paid in advance but the tenant moves out after 6 months.

  • Example: Prepaid insurance premium is cancelled before the policy period ends.

  • The credit balance is recorded as a liability on ...read more

View 1 answer
Discover NPB CONSULTANTS interview dos and don'ts from real experiences

Q5. How will you search for content in a pool of resources

Ans.

I would use a combination of search filters, keywords, and metadata to efficiently search for relevant content.

  • Identify the specific pool of resources and their organization

  • Use search filters such as date, author, and type of content

  • Utilize relevant keywords and synonyms

  • Take advantage of metadata such as tags and descriptions

  • Consider the context and purpose of the search

  • Refine the search based on initial results

Add your answer

Q6. 1. What are the main components of CAM(MSME etc)?.

Ans.

CAM (MSME etc) has components like financial assistance, technology upgradation, marketing support, and skill development.

  • Financial assistance: loans, subsidies, grants, etc.

  • Technology upgradation: modernization of machinery, equipment, etc.

  • Marketing support: promotion, branding, advertising, etc.

  • Skill development: training, workshops, seminars, etc.

  • Examples: MSME has schemes like Credit Guarantee Fund Trust for Micro and Small Enterprises, Prime Minister's Employment Generat...read more

Add your answer
Are these interview questions helpful?

Q7. 2. How do you access risk in any project?

Ans.

Risk assessment involves identifying potential risks and evaluating their likelihood and impact on the project.

  • Identify potential risks and their impact on the project

  • Evaluate the likelihood of each risk occurring

  • Assess the severity of the impact of each risk

  • Develop a risk management plan to mitigate or avoid identified risks

  • Regularly review and update the risk management plan throughout the project

Add your answer

Q8. How ur development resolve the client’s problems

Ans.

Our development team resolves client problems by analyzing requirements, designing solutions, and implementing them effectively.

  • Analyze client requirements thoroughly to understand the root cause of the problem

  • Design customized solutions that address the specific needs of the client

  • Implement solutions efficiently and effectively to resolve the client's problems

  • Provide ongoing support and maintenance to ensure the solution continues to meet the client's needs

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. How to create Changes only extra.

Ans.

To create Changes only extra, identify existing changes and add new ones without modifying the existing ones.

  • Identify existing changes

  • Add new changes without modifying existing ones

  • Ensure new changes do not conflict with existing ones

  • Document all changes made

Add your answer

Q10. How to create balance group and usages

Ans.

Balance groups can be created by analyzing usage patterns and grouping similar items together.

  • Analyze usage patterns to identify similar items

  • Group similar items together to create balance groups

  • Consider factors such as frequency of use and importance of items in the group

  • Examples include grouping similar products in a store or grouping tasks by priority in a to-do list

Add your answer

Q11. What is your company manufacturing

Ans.

We manufacture electronic devices for home and office use.

  • Our products include smart home devices, routers, and printers.

  • We focus on creating user-friendly and innovative technology.

  • Our devices are designed to improve productivity and simplify daily tasks.

  • We also offer customer support and maintenance services.

  • Examples of our products include smart thermostats, wireless speakers, and all-in-one printers.

View 1 answer

Q12. What are the steps involved in setting up failover clustering?

Ans.

Setting up failover clustering involves several steps to ensure high availability and reliability of systems.

  • Install the Failover Clustering feature on all servers that will participate in the cluster.

  • Configure shared storage for the cluster, such as a SAN or NAS.

  • Create a cluster by running the Failover Cluster Manager and following the wizard to add servers to the cluster.

  • Configure cluster networks and assign IP addresses for the cluster and each node.

  • Install and configure c...read more

Add your answer

Q13. What is Procurement process

Ans.

Procurement process is the series of steps involved in acquiring goods or services from external sources.

  • Identifying the need for goods or services

  • Developing specifications

  • Identifying potential suppliers

  • Evaluating and selecting suppliers

  • Negotiating contracts

  • Placing orders

  • Receiving and inspecting goods or services

  • Processing invoices and making payments

Add your answer

Q14. What are different OOP features

Ans.

OOP features include encapsulation, inheritance, polymorphism, and abstraction.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit (class).

  • Inheritance: Allows a class to inherit properties and behavior from another class.

  • Polymorphism: Ability to present the same interface for different data types.

  • Abstraction: Hiding the complex implementation details and showing only the necessary features.

Add your answer

Q15. What do know about business analyst on banking and insurance.

Ans.

Business analysts in banking and insurance focus on analyzing financial data, identifying trends, and improving operational efficiency.

  • Analyze financial data to identify trends and make recommendations for improvement

  • Work closely with stakeholders to understand business needs and requirements

  • Develop and implement strategies to improve operational efficiency and reduce costs

  • Ensure compliance with regulations and industry standards

  • Use data analytics tools and techniques to supp...read more

Add your answer

Q16. What is the process you follow in budgeting

Ans.

I follow a structured process that involves analyzing past spending, setting goals, and creating a detailed plan.

  • Analyze past spending to identify areas where costs can be reduced

  • Set clear goals for the budget, such as reducing expenses or increasing revenue

  • Create a detailed plan that includes specific targets and timelines

  • Regularly review and adjust the budget as needed

  • Communicate the budget to relevant stakeholders, such as department heads or executives

Add your answer

Q17. How to handle multiple window in selenium?

Ans.

Handling multiple windows in Selenium involves switching between windows and performing actions on each window.

  • Use getWindowHandles() to get all window handles

  • Switch to a specific window using switchTo().window(handle)

  • Perform actions on the window

  • Close the window or switch back to the original window

Add your answer

Q18. What is swift 563, 564 588 and corp in detail

Ans.

Swift 563, 564, 588 are message types used in financial transactions. Corp refers to corporate payments.

  • Swift 563 is used for requesting a payment order

  • Swift 564 is used for acknowledging a payment order

  • Swift 588 is used for a request to cancel a payment order

  • Corp refers to corporate payments made by a company to its suppliers or employees

Add your answer

Q19. What is the process of SQL Server Always On?

Ans.

SQL Server Always On is a high availability and disaster recovery solution that provides redundancy and failover capabilities.

  • SQL Server Always On is a feature in SQL Server that provides high availability and disaster recovery solutions.

  • It allows for automatic failover between multiple replicas to ensure minimal downtime.

  • There are two types of Always On configurations: Always On Failover Cluster Instances (FCI) and Always On Availability Groups (AG).

  • FCI provides redundancy a...read more

Add your answer

Q20. How to initialize an array

Ans.

An array can be initialized by declaring the array variable and assigning values within curly braces.

  • Declare the array variable with the data type and square brackets, e.g. String[] arrayName;

  • Initialize the array by assigning values within curly braces, e.g. arrayName = new String[] {"value1", "value2", "value3"};

  • Alternatively, you can combine declaration and initialization in one line, e.g. String[] arrayName = {"value1", "value2", "value3"};

Add your answer

Q21. What are external internal tables in hive?

Ans.

External and internal tables in Hive are two types of tables used to store data in Hive.

  • External tables store data outside of Hive's warehouse directory, while internal tables store data within the warehouse directory

  • External tables do not delete data when the table is dropped, while internal tables delete data

  • External tables are useful for sharing data between different Hive instances or with external systems

  • Internal tables are managed by Hive, while external tables are mana...read more

Add your answer

Q22. What are internal and external tables in hive?

Ans.

Internal and external tables in Hive are two types of tables used to store data in Hive.

  • Internal tables store data in a default location managed by Hive

  • External tables store data in a location specified by the user

  • Internal tables are deleted when the table is dropped, while external tables retain data in the specified location

  • Example: CREATE TABLE internal_table (col1 INT, col2 STRING) STORED AS ORC;

  • Example: CREATE EXTERNAL TABLE external_table (col1 INT, col2 STRING) LOCATIO...read more

Add your answer

Q23. Types of users in the SAP system? Difference between them

Ans.

Types of users in SAP system include end users, power users, and administrators.

  • End users: Regular users who perform day-to-day transactions in the system.

  • Power users: Users with advanced knowledge who can perform more complex tasks and configurations.

  • Administrators: Users responsible for managing the system, setting up security, and maintaining the system.

  • Difference: End users primarily use the system for transactions, power users have more advanced capabilities, and adminis...read more

Add your answer

Q24. What are the Pyramids of matrix

Ans.

Pyramids of matrix refer to the hierarchical structure of a matrix organization.

  • The pyramids represent the levels of authority and decision-making within the organization.

  • The higher up the pyramid, the more power and responsibility the individual holds.

  • Examples include CEO at the top, followed by executives, managers, and then employees.

  • The pyramids can vary in size and complexity depending on the organization's structure.

  • They can also be used to visualize the flow of communi...read more

Add your answer

Q25. Please explain difference between group by and having

Ans.

Group by is used to group rows that have the same values into summary rows, while having is used to filter groups based on a specified condition.

  • Group by is used with aggregate functions to group rows based on one or more columns.

  • Having is used to filter groups based on a specified condition after the group by clause.

  • Example: SELECT department, AVG(salary) FROM employees GROUP BY department HAVING AVG(salary) > 50000;

Add your answer

Q26. Technical concept of technology u used and worked on

Ans.

I have worked on the technical concept of machine learning algorithms.

  • Implemented and optimized various machine learning algorithms such as linear regression, decision trees, and support vector machines.

  • Utilized Python libraries like scikit-learn and TensorFlow for implementing and training machine learning models.

  • Worked on feature engineering techniques to extract relevant information from raw data.

  • Performed model evaluation and validation using techniques like cross-validat...read more

Add your answer

Q27. What is the use of SQL commands

Ans.

SQL commands are used to interact with databases by performing various operations such as querying, updating, inserting, and deleting data.

  • SQL commands are used to retrieve data from databases using SELECT statement.

  • SQL commands can be used to update existing data in a database using UPDATE statement.

  • SQL commands can be used to insert new data into a database using INSERT statement.

  • SQL commands can be used to delete data from a database using DELETE statement.

Add your answer

Q28. What real tile experianxe you ha either

Ans.

I have over 5 years of experience working as a Senior Analyst in the financial industry.

  • Led a team in analyzing market trends and making investment recommendations

  • Developed complex financial models to forecast company performance

  • Presented findings to senior management and clients

  • Managed large datasets and conducted in-depth research on industry sectors

Add your answer

Q29. Different between Secured View and Table

Ans.

Secured View and Table are two different ways of presenting data.

  • Secured View is a restricted view of data that only shows certain information to certain users.

  • Table is a way of presenting data in a structured format with rows and columns.

  • Secured View is used to protect sensitive information from unauthorized access.

  • Table is used to organize and display data in a clear and concise manner.

  • Secured View can be customized to show different information to different users based on ...read more

Add your answer

Q30. Different data types in JAVA

Ans.

Different data types in JAVA include primitive types (int, double, boolean), reference types (String, Object), and arrays.

  • Primitive types: int, double, boolean

  • Reference types: String, Object

  • Arrays: int[], String[]

Add your answer

Q31. What company value you possess?

Ans.

I possess the company value of integrity, always prioritizing honesty and ethical behavior in my work.

  • Consistently making decisions based on ethical principles

  • Being transparent and honest in all communications

  • Maintaining confidentiality when necessary

  • Acting in the best interest of the company and its stakeholders

  • Setting a positive example for others to follow

Add your answer

Q32. What is action filter in c#

Ans.

Action filter in C# is a custom attribute that can be applied to controller actions to perform logic before or after the action is executed.

  • Action filters can be used for logging, authorization, caching, etc.

  • Examples include AuthorizeAttribute for authorization and OutputCacheAttribute for caching.

  • They implement IActionFilter, IResultFilter, IExceptionFilter, or IAuthorizationFilter interfaces.

Add your answer

Q33. Different between extract and bip

Ans.

Extract is a process of retrieving data from a source system, while BIP is a tool used for creating and managing reports.

  • Extract involves pulling data from a source system and storing it in a separate location for analysis or reporting.

  • BIP is a tool used for creating and managing reports, which can be based on data extracted from a source system.

  • Extract is typically a one-time process, while BIP can be used to generate reports on a regular basis.

  • Examples of extract tools incl...read more

Add your answer

Q34. Hard assert and soft assert difference

Ans.

Hard assert is a mandatory step that stops the execution if failed, while soft assert is a non-mandatory step that continues execution even if failed.

  • Hard assert is used to validate critical checkpoints in the code, while soft assert is used for non-critical checkpoints.

  • Hard assert throws an exception and stops the execution if failed, while soft assert logs the failure but continues the execution.

  • Hard assert is typically used for validating essential elements like login func...read more

Add your answer

Q35. What is Variance analysis

Ans.

Variance analysis is a technique used to compare actual performance to planned performance.

  • It involves identifying and analyzing the differences between planned and actual results.

  • It helps in identifying the reasons for the differences and taking corrective actions.

  • It is commonly used in budgeting and financial analysis.

  • Example: If a company planned to sell 1000 units of a product but only sold 800, variance analysis would help identify the reasons for the shortfall.

  • Example: ...read more

Add your answer

Q36. Diamond problem in java

Ans.

Diamond problem in Java occurs when a class inherits from two classes that have a common ancestor.

  • Diamond problem arises in multiple inheritance scenarios in Java

  • It occurs when a class inherits from two classes that have a common ancestor

  • Java does not support multiple inheritance to avoid the diamond problem

Add your answer

Q37. Different types of Corporate Actions

Ans.

Corporate actions are events initiated by a company that can affect the stock price and shareholder value.

  • Types of corporate actions include stock splits, dividends, mergers and acquisitions, spin-offs, and rights issues.

  • Stock splits involve dividing existing shares into multiple shares to increase liquidity and affordability.

  • Dividends are payments made to shareholders from a company's profits.

  • Mergers and acquisitions involve the consolidation of two or more companies.

  • Spin-of...read more

Add your answer

Q38. memory management in depth in Java

Ans.

Memory management in Java involves automatic memory allocation and garbage collection.

  • Java uses automatic memory management through garbage collection to allocate and deallocate memory.

  • Garbage collection in Java helps in reclaiming memory occupied by objects that are no longer in use.

  • Java Virtual Machine (JVM) manages memory allocation and deallocation for Java programs.

  • Memory leaks can occur in Java if objects are not properly dereferenced, leading to inefficient memory usag...read more

Add your answer

Q39. write python code to reverse the string

Ans.

Python code to reverse a string

  • Use string slicing with a step of -1 to reverse the string

  • Alternatively, use the built-in 'reversed' function to reverse the string

  • Convert the string to a list, reverse the list, then join the list back into a string

Add your answer

Q40. what is middleware in .net

Ans.

Middleware in .NET is software that acts as a bridge between an application and the operating system, enabling communication and data exchange.

  • Middleware helps in handling communication between different components of an application.

  • It provides services such as authentication, logging, caching, and error handling.

  • Examples of middleware in .NET include ASP.NET Core middleware for request processing and OWIN middleware for authentication.

  • Middleware can be added to the applicati...read more

Add your answer

Q41. what is incident Life cycle

Ans.

Incident life cycle refers to the stages an incident goes through from detection to resolution.

  • Detection: Incident is identified or reported.

  • Analysis: Incident is investigated to determine cause and impact.

  • Response: Actions are taken to mitigate the incident.

  • Resolution: Incident is resolved and closed.

  • Post-Incident Review: Lessons learned are documented for future prevention.

Add your answer

Q42. What are window function

Ans.

Window functions are a type of function in SQL that perform calculations across a set of table rows related to the current row.

  • Window functions are used to perform calculations on a set of rows related to the current row.

  • They allow you to perform calculations without grouping the rows into a single output row.

  • Examples of window functions include ROW_NUMBER(), RANK(), and NTILE().

Add your answer

Q43. P2P cycle and integration of p2p with fi

Ans.

P2P cycle refers to procure-to-pay process, which involves purchasing goods/services and paying for them. Integration of P2P with FI (financial institution) streamlines financial transactions.

  • P2P cycle involves requisitioning, purchasing, receiving, and paying for goods/services.

  • Integration of P2P with FI automates payment processes, improves accuracy, and enhances financial visibility.

  • Examples of P2P integration with FI include electronic invoicing, automated payment approva...read more

Add your answer

Q44. scope of beans in spring boot

Ans.

Beans in Spring Boot are objects managed by the Spring IoC container.

  • Beans are Java objects that are instantiated, assembled, and managed by the Spring IoC container.

  • Beans are defined in the Spring configuration file or using annotations like @Component, @Service, @Repository, or @Controller.

  • Beans can be scoped as singleton, prototype, request, session, or custom scopes.

  • Example: @Component annotation marks a class as a Spring bean.

Add your answer

Q45. What is forwardRef

Ans.

forwardRef is a function in React that allows you to access a child component's instance before it is rendered.

  • Used for accessing child component's instance before it is rendered

  • Helps in resolving circular dependencies in components

  • Commonly used in higher-order components and custom hooks

Add your answer

Q46. What os star schema

Ans.

Star schema is a type of data warehouse schema where a central fact table is connected to multiple dimension tables.

  • Central fact table contains the primary data of interest

  • Dimension tables provide context and details about the data in the fact table

  • Each dimension table is connected to the fact table through a foreign key

  • Allows for efficient querying and analysis of data

Add your answer

Q47. Destils sbout psdt project

Ans.

The PSDT project is a strategic initiative aimed at improving efficiency and effectiveness in our operations.

  • The PSDT project focuses on streamlining processes and reducing costs.

  • It involves implementing new technologies and tools to enhance productivity.

  • The project aims to optimize resource allocation and improve decision-making.

  • Examples: implementing a new CRM system, restructuring supply chain processes.

Add your answer

Q48. What is Component.js

Ans.

Component.js is a JavaScript library used for building web components.

  • Component.js is a lightweight library for creating reusable web components.

  • It allows developers to encapsulate HTML, CSS, and JavaScript into custom elements.

  • These custom elements can then be easily reused across different web pages or applications.

  • Component.js simplifies the process of creating modular and maintainable front-end code.

Add your answer

Q49. Previous process explanation

Ans.

I will explain the previous process followed in my role as a Senior Analyst.

  • The previous process involved gathering data from multiple sources.

  • Analyzing the data to identify trends and patterns.

  • Creating reports and presentations to communicate findings to stakeholders.

  • Collaborating with team members to ensure accuracy and completeness of analysis.

Add your answer

Q50. Details of 401k service

Ans.

401k service is a retirement savings plan sponsored by an employer that allows employees to save and invest a portion of their paycheck before taxes.

  • Employer-sponsored retirement savings plan

  • Allows employees to save and invest a portion of their paycheck before taxes

  • May include employer matching contributions

  • Contributions are typically invested in a variety of mutual funds or other investment options

Add your answer

Q51. Reason for switching

Ans.

Seeking new challenges and opportunities for growth in a different environment.

  • Looking for new challenges and opportunities to grow professionally

  • Interested in exploring different industries or sectors

  • Seeking a change in work culture or environment

  • Want to broaden skill set and knowledge base

  • Desire for career advancement or higher salary potential

Add your answer

Q52. Tools worked on

Ans.

I have experience working with tools such as Tableau, SQL, Excel, and Python for data analysis.

  • Tableau for data visualization

  • SQL for querying databases

  • Excel for data manipulation

  • Python for scripting and automation

Add your answer

Q53. Bad debt explain

Ans.

Bad debt refers to money owed to a company that is unlikely to be recovered.

  • Bad debt occurs when a customer fails to pay their outstanding balance.

  • It can result from customers declaring bankruptcy or simply refusing to pay.

  • Companies may write off bad debts as a loss on their financial statements.

  • Bad debt can impact a company's cash flow and profitability.

  • Examples include unpaid invoices, defaulted loans, and bounced checks.

Add your answer

More about working at Accenture

Top Rated Mega Company - 2024
Top Rated Company for Women - 2024
Top Rated IT/ITES Company - 2024
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at NPB CONSULTANTS

based on 132 interviews
5 Interview rounds
Technical Round
HR Round - 1
HR Round - 2
Personal Interview1 Round - 1
Personal Interview1 Round - 2
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Senior Analyst Interview Questions from Similar Companies

3.5
 • 49 Interview Questions
3.8
 • 46 Interview Questions
3.3
 • 32 Interview Questions
3.8
 • 19 Interview Questions
3.9
 • 13 Interview Questions
3.3
 • 10 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter