
Accenture


50+ Accenture Team Lead Interview Questions and Answers
Q1. which is fastest between java 8 intermediate and terminal operations
Java 8 intermediate and terminal operations have the same speed.
Intermediate operations are lazy and do not execute until a terminal operation is called
Terminal operations trigger the execution of the entire stream pipeline
The speed of intermediate and terminal operations depends on the size of the stream and the complexity of the operations
Therefore, it is not accurate to say that one is always faster than the other
Q2. difference between primary key and unique key
Primary key uniquely identifies a record in a table, while unique key ensures uniqueness of a column.
Primary key cannot have null values, while unique key can have one null value.
A table can have only one primary key, but multiple unique keys.
Primary key is used as a foreign key in other tables, while unique key is not.
Example: Employee ID can be a primary key, while email address can be a unique key.
Q3. What is directive and what are the different types of directive? What is Angular life cycle hook? Difference between ngOnChanges(), ngOnInit() and ngDoCheck()? What is closure? What is Hoisting? what is Lazy lo...
read moreDirectives in Angular are markers on a DOM element that tell Angular to attach a specific behavior to that element or transform the DOM element and its children.
Types of directives: Structural directives (ngIf, ngFor) and Attribute directives (ngModel, ngStyle)
Angular life cycle hook: A set of methods that Angular calls on a directive/component at defined points in time
Difference between ngOnChanges(), ngOnInit() and ngDoCheck(): ngOnChanges() is called when an input binding ...read more
Q4. How will you design security for global implementation?
Designing security for global implementation involves considering various factors and implementing a comprehensive strategy.
Conduct a thorough risk assessment to identify potential vulnerabilities and threats
Implement strong access controls and authentication mechanisms
Encrypt sensitive data both in transit and at rest
Establish a robust incident response plan
Regularly update and patch systems to address security vulnerabilities
Implement network segmentation to limit the impac...read more
Q5. four pillars of oops
Four pillars of OOPs are Abstraction, Encapsulation, Inheritance, and Polymorphism.
Abstraction: Hiding implementation details and showing only necessary information.
Encapsulation: Binding data and functions together and restricting access to them.
Inheritance: Acquiring properties and behavior of a parent class by a child class.
Polymorphism: Ability of an object to take many forms and perform different actions based on the context.
Q6. Infrastructure of the application from resume, how to handle the non performing the member
To handle non-performing team members in application infrastructure
Identify the root cause of non-performance
Provide feedback and coaching to improve performance
Set clear expectations and goals
Offer additional training or resources
Consider reassigning or terminating the team member if necessary
Q7. What is cursor? What is REF CURSOR? Write the syntax for Before Insert row trigger What are all the DBMS_*** packages u have used? What are exceptions and how it is handled? What are Partitions and what is exch...
read moreA cursor is a database object used to retrieve data row by row, while a REF CURSOR is a pointer to a cursor result set.
Cursor is used to fetch data row by row in a database query.
REF CURSOR is a pointer to a cursor result set, allowing it to be passed between PL/SQL programs.
Syntax for Before Insert row trigger: CREATE OR REPLACE TRIGGER trigger_name BEFORE INSERT ON table_name FOR EACH ROW BEGIN ... END;
DBMS_*** packages are built-in packages in Oracle for various functional...read more
Q8. difference between hibernate get and load method
Hibernate get and load method difference
get() method returns null if the object is not found in the database
load() method throws ObjectNotFoundException if the object is not found in the database
get() method hits the database immediately
load() method returns a proxy object and hits the database only when the actual data is needed
Q9. can instance variables be overridden
Yes, instance variables can be overridden.
Instance variables can be overridden in subclasses.
The subclass can declare a variable with the same name as the superclass variable.
The subclass variable will then override the superclass variable.
This is known as variable shadowing.
Example: class A has an instance variable 'x', class B extends A and also has an instance variable 'x', B's 'x' will override A's 'x'.
Q10. Have you worked on agile methodologies? what are the different artifacts in agile framework
Yes, I have worked on agile methodologies. The different artifacts in agile framework include user stories, product backlog, sprint backlog, burndown charts, and retrospectives.
User stories: Descriptions of features from an end-user perspective
Product backlog: List of all desired features and enhancements for a product
Sprint backlog: Subset of the product backlog items selected for a sprint
Burndown charts: Visual representation of work remaining in a sprint
Retrospectives: Mee...read more
Q11. can static method be overriden
No, static methods cannot be overridden.
Static methods belong to the class and not to the instance of the class.
They can be called using the class name without creating an object.
Subclasses can have methods with the same name as the static method in the parent class, but it won't override it.
Q12. What is indexing policy of cosmosDB?
Indexing policy in CosmosDB defines how documents are indexed and queried.
Indexing policy determines which properties of a document are indexed and how they are indexed.
It also defines the consistency level for queries.
Indexing policy can be set at the container level or at the document level.
Examples of indexing policies include Range, Hash, Spatial, and Composite indexes.
Q13. complie time & run time polymorphism
Compile time polymorphism is achieved through function overloading and templates, while run time polymorphism is achieved through virtual functions.
Compile time polymorphism is resolved at compile time, while run time polymorphism is resolved at run time.
Function overloading allows multiple functions with the same name but different parameters to be defined.
Templates allow functions or classes to be defined with generic types that are determined at compile time.
Virtual functi...read more
Q14. How to create custom directive? Difference between AOT and JIT? Difference between Reactive form and Template driven form? Difference between var and let? Difference between Promise and Observable?
Creating custom directives, differences between AOT and JIT compilation, Reactive form vs Template driven form, var vs let, Promise vs Observable
Custom directives in Angular are created using @Directive decorator and can be used to add behavior to elements in the DOM.
AOT (Ahead of Time) compilation happens during the build process, while JIT (Just in Time) compilation happens at runtime.
Reactive forms in Angular are more flexible and allow for complex form validation and dyna...read more
Q15. Have you worked on Agile methodology. Can you describe different artifacts in the agile framework
Yes, I have worked on Agile methodology. Different artifacts in Agile framework include user stories, product backlog, sprint backlog, burndown charts, and retrospective meetings.
User stories: Descriptions of features from an end-user perspective
Product backlog: List of all desired features and enhancements for the product
Sprint backlog: List of tasks to be completed during a sprint
Burndown charts: Visual representation of work remaining in a sprint
Retrospective meetings: Ref...read more
Q16. difference between predicate and function
A predicate is a statement that evaluates to true or false, while a function returns a value.
A predicate is used to test a condition and returns a boolean value.
A function takes input parameters and returns a value based on those parameters.
Predicates are commonly used in conditional statements and loops.
Functions can be used for a variety of purposes, such as calculations or data manipulation.
Example of a predicate: x > 5
Example of a function: sum(x, y) = x + y
Q17. existing project mircro services architecture
Existing project follows microservices architecture.
The project is divided into smaller, independent services.
Each service has its own database and communicates with other services through APIs.
This architecture allows for easier scalability and maintenance.
Examples of microservices in the project may include user authentication, payment processing, and inventory management.
Q18. what is hibernate patch
Hibernate patch is a fix for bugs or issues in the Hibernate framework.
Hibernate patch is a software update that addresses bugs or issues in the Hibernate framework.
It is used to fix problems related to database connectivity, performance, and security.
Hibernate patches are released periodically and can be downloaded from the official website.
For example, Hibernate 5.4.30.Final is a patch release that fixes several issues in the previous version.
Q19. How would you assign permission via lookup to a group
Assigning permissions via lookup to a group involves mapping group IDs to permission levels.
Create a lookup table mapping group IDs to permission levels
Assign the appropriate permission level to each group
Use the lookup table to quickly assign permissions to groups
Q20. different collection algorithms
Collection algorithms are used to organize and manage data in data structures.
Some common collection algorithms include sorting, searching, and hashing.
Sorting algorithms include bubble sort, quicksort, and merge sort.
Searching algorithms include linear search and binary search.
Hashing algorithms include MD5 and SHA-1.
The choice of algorithm depends on the type of data and the desired outcome.
Q21. How we can print specific to MRP controller?
To print specific to MRP controller, use transaction code MRP1.
Use transaction code MRP1 to access the MRP controller printing options.
Select the specific MRP controller for which you want to print.
Choose the relevant output format and execute the print function.
Review the printed output to ensure it contains the desired information.
Q22. Different criteria methods in hibernate
Hibernate supports different criteria methods for querying data from the database.
Criteria API: used to create and execute object-oriented queries
Example: Criteria criteria = session.createCriteria(Employee.class);
DetachedCriteria: used to create criteria queries outside of a session
Example: DetachedCriteria criteria = DetachedCriteria.forClass(Employee.class);
Query by Example: used to query based on an example object
Example: Employee employee = new Employee(); Example exampl...read more
Q23. different transactional propagations
Transactional propagations refer to the way transactions are managed and propagated across multiple resources.
Propagation behavior determines how transactions are managed across multiple resources
There are different types of propagation behavior such as REQUIRED, REQUIRES_NEW, SUPPORTS, MANDATORY, NOT_SUPPORTED, NEVER
REQUIRED - transaction must be present, REQUIRES_NEW - new transaction is created, SUPPORTS - transaction is optional, MANDATORY - transaction must be present, N...read more
Q24. How do you integrate Cloud with legacy
Integrating Cloud with legacy systems requires careful planning and execution.
Assess the existing legacy systems and identify their dependencies and limitations
Choose the appropriate cloud service model (IaaS, PaaS, or SaaS) based on the requirements
Develop a migration strategy and roadmap, considering factors like data security, compliance, and performance
Implement integration mechanisms like APIs, connectors, or middleware to connect the cloud and legacy systems
Test and val...read more
Q25. guard let statement when to use
Use guard let statement to safely unwrap optional values and handle nil cases.
Use guard let to check if an optional value is nil before using it.
It is commonly used to unwrap optionals in the beginning of a function.
If the optional value is nil, the guard statement will exit the current scope.
Example: guard let name = person.name else { return }
Q26. What do you know about SharePoint?
SharePoint is a web-based collaborative platform used for document management and team collaboration.
SharePoint is developed by Microsoft and is part of the Microsoft 365 suite.
It allows users to create websites, store and share documents, and collaborate with others.
SharePoint provides features like version control, workflow management, and search functionality.
It can be used for various purposes such as intranet portals, document management systems, and project management.
S...read more
Q27. What are different types of Cloud
Different types of Cloud include Public, Private, Hybrid, and Multi-Cloud.
Public Cloud: Services offered to anyone on the internet (e.g. AWS, Azure)
Private Cloud: Services offered to a single organization (e.g. VMware, OpenStack)
Hybrid Cloud: Combination of Public and Private Clouds (e.g. Google Anthos)
Multi-Cloud: Use of multiple Public Cloud providers (e.g. using AWS and Azure together)
Q28. Difference between Angular and React
Angular is a complete framework while React is a library for building UI components.
Angular has a steeper learning curve and requires more setup time
React is more flexible and can be used with other libraries
Angular has a built-in dependency injection system
React uses a virtual DOM for efficient rendering
Angular has a larger file size compared to React
Angular has a more opinionated approach to development
React is easier to test due to its modular nature
Q29. Difference between Virtual Machine and Hypervisor?
A hypervisor is a software that creates and runs virtual machines, while a virtual machine is an emulation of a physical computer.
Hypervisor is a software that allows multiple operating systems to share a single hardware host.
Virtual machine is an isolated environment created by the hypervisor to run guest operating systems.
Hypervisor provides the necessary abstraction to manage and allocate physical resources to virtual machines.
Examples of hypervisors include VMware ESXi, M...read more
Q30. How to configure P2P VPN Tunnel
P2P VPN tunnel can be configured by setting up VPN connections between two devices using a shared key or certificate.
Choose a VPN protocol such as IPsec or OpenVPN
Configure the VPN settings on both devices including IP addresses, shared key or certificates
Establish the VPN connection between the two devices
Test the connection to ensure data is securely transmitted
Q31. What is Entity and Entity Relationship
Entity is a real-world object or concept that has a unique identity. Entity Relationship is a diagrammatic representation of entities and their relationships.
Entity is a thing or object in the real world that can be distinguished from other objects.
Entity Relationship is a visual representation of how entities are related to each other.
Entities can have attributes that describe their characteristics.
Entities can have relationships with other entities, such as one-to-one, one-...read more
Q32. Mapping experice with JD or opening they have
Mapping experience with job description or requirements
Highlight relevant experience that aligns with the job description
Provide specific examples of how your skills match the requirements
Demonstrate understanding of the key responsibilities outlined in the job description
Q33. What is CosmosDB sharding policy?
CosmosDB sharding policy determines how data is partitioned across multiple physical partitions.
Sharding policy is set at the container level
It determines the partition key and the number of physical partitions
Hash-based sharding is the default policy
Range-based sharding can be used for scenarios where data is accessed in a specific order
Custom sharding can be implemented using stored procedures
Q34. Explain the order to cash cycle?
Order to cash cycle is the process of receiving and fulfilling customer orders, invoicing, and receiving payment.
Customer places an order for a product or service
Order is processed and fulfilled by the company
Invoice is generated and sent to the customer
Customer makes payment for the order
Payment is received and recorded by the company
Q35. What is Page flow BPM?
Page flow BPM is a process modeling technique that maps out the flow of pages in a web application.
It helps to identify the sequence of pages and actions required to complete a task
It can be used to optimize the user experience and improve efficiency
Example: Mapping out the flow of pages for an e-commerce website's checkout process
Q36. What is architecture of ETL
ETL architecture involves three main components: extraction, transformation, and loading.
Extraction involves retrieving data from various sources such as databases, files, and APIs.
Transformation involves cleaning, filtering, and converting data to make it usable for analysis.
Loading involves storing the transformed data into a target database or data warehouse.
ETL architecture can be designed using various tools such as Apache Spark, Talend, and Informatica.
The architecture ...read more
Q37. Short lived BPM vs Long lived BPM
Short lived BPMs are quick fixes while long lived BPMs are sustainable solutions.
Short lived BPMs are implemented to address immediate problems without considering long-term effects.
Long lived BPMs are designed to provide sustainable solutions that can adapt to changing circumstances.
Examples of short lived BPMs include quick process changes to meet a deadline or address a specific issue.
Examples of long lived BPMs include continuous process improvement initiatives and strate...read more
Q38. Compile time vs run time polymorphism
Compile time polymorphism is achieved through function overloading and operator overloading, while run time polymorphism is achieved through virtual functions and inheritance.
Compile time polymorphism is resolved during compile time based on the number and types of arguments passed to a function.
Run time polymorphism is resolved during runtime based on the actual type of object being referred to.
Compile time polymorphism is also known as static polymorphism, while run time po...read more
Q39. Explain the architecture of the project
The project architecture follows a microservices design pattern with separate components for different functionalities.
The project is divided into multiple microservices, each responsible for a specific functionality.
Communication between microservices is typically done through APIs or message queues.
There is a central service registry for service discovery and load balancing.
Data storage may be distributed across multiple databases or data stores.
Scalability and fault tolera...read more
Q40. Process to define approval flows
Approval flows are defined by mapping out the steps and decision points in a process to determine who needs to approve at each stage.
Identify all stakeholders involved in the approval process
Map out the steps and decision points in the process
Determine the criteria for approval at each stage
Assign specific approvers to each step based on criteria
Implement a system or tool to automate and track approval flows
Q41. What are Java Collections?
Java Collections are frameworks that provide an architecture to store and manipulate a group of objects.
Java Collections provide interfaces (List, Set, Map) and classes (ArrayList, LinkedList, HashSet, HashMap) to store and manipulate groups of objects.
Collections framework includes algorithms to manipulate collections, such as sorting and searching.
Collections are dynamic in nature, meaning they can grow and shrink in size as needed.
Examples: ArrayList, LinkedList, HashSet, ...read more
Q42. Explained Worksoft Architecture
Worksoft Architecture is a framework for automated testing of enterprise applications.
Worksoft Architecture is based on a modular design that allows for easy customization and integration with other tools.
It uses a component-based approach to testing, with reusable components that can be easily assembled into test cases.
Worksoft Architecture supports a wide range of technologies and platforms, including SAP, Oracle, and web applications.
It provides a centralized repository fo...read more
Q43. What is Static keyword
Static keyword is used in programming languages to declare variables, methods, or classes that belong to the class itself rather than instances of the class.
Static variables retain their values across all instances of a class.
Static methods can be called without creating an instance of the class.
Static classes cannot be instantiated and are used for grouping related methods and variables.
In Java, static keyword is used to create class variables and methods.
Example: public sta...read more
Q44. Compatibility with the organization
I am highly compatible with the organization and its values.
I have researched the organization and its mission statement to ensure alignment with my personal values.
I have experience working in similar environments and understand the importance of teamwork and communication.
I am adaptable and willing to learn and grow within the organization.
I am excited about the opportunity to contribute to the organization's success.
Q45. Twhat is test strategy
Test strategy is a high-level plan to achieve testing objectives and goals.
Test strategy outlines the approach to be used for testing a particular product or project.
It includes the scope of testing, resources, timelines, and risks involved.
Test strategy helps in identifying the testing methods, techniques, and tools to be used.
It also defines the entry and exit criteria for testing phases.
Example: A test strategy for a mobile application may include testing on various device...read more
Q46. How to do Deployment
Deployment involves releasing software updates to production servers.
Create a deployment plan outlining steps and responsibilities
Test the deployment process in a staging environment
Use automation tools like Jenkins or Ansible for seamless deployments
Monitor the deployment process for any issues
Rollback plan in case of deployment failure
Q47. What is osgi model
OSGi is a modular architecture for Java applications.
OSGi allows applications to be composed of small, reusable modules called bundles.
Each bundle can contain Java classes, resources, and metadata.
Bundles can be dynamically installed, started, stopped, updated, and uninstalled at runtime.
OSGi provides a service registry for bundles to publish and consume services.
OSGi is commonly used in enterprise applications and IoT devices.
Q48. C++ coding on polymorphism
Polymorphism in C++ allows objects of different classes to be treated as objects of a common superclass.
Polymorphism is achieved through virtual functions in C++.
Derived classes can override the virtual functions of the base class.
Example: Base class 'Shape' with virtual function 'draw()', derived classes 'Circle' and 'Rectangle' overriding 'draw()'.
Q49. Resolve deadlocks in database
Deadlocks in databases can be resolved by using techniques such as deadlock detection, prevention, and avoidance.
Use deadlock detection algorithms to identify and break deadlocks
Implement timeouts to automatically release locks if deadlock occurs
Ensure transactions acquire locks in the same order to prevent deadlocks
Use lock escalation to reduce the number of locks held by transactions
Q50. What is Test plan
A test plan is a document outlining the approach, resources, schedule, and scope of testing activities for a software project.
Defines the objectives, scope, and approach of testing
Outlines the resources, schedule, and responsibilities for testing
Includes test cases, test scenarios, and test data
Helps in identifying risks and mitigation strategies
Serves as a guide for the testing team throughout the project
Q51. What is current ctc
My current CTC is $80,000 per year.
My current CTC is $80,000 per year
I am currently earning $80,000 annually
My current salary package is $80,000 per annum
Q52. Explain about System refresh
System refresh is the process of copying production data to a non-production environment for testing or training purposes.
System refresh involves copying data from a production environment to a non-production environment.
It is commonly done to ensure that the non-production environment is up-to-date and accurate for testing or training purposes.
System refresh can help identify any issues or discrepancies that may arise when moving data between environments.
Examples of non-pro...read more
Q53. Explain about Design patterns
Design patterns are reusable solutions to common problems in software design.
Design patterns help in creating flexible, maintainable, and scalable software.
They provide a common language for developers to communicate about solutions.
Examples include Singleton, Factory, Observer, and Strategy patterns.
Q54. Useful hooks in React js
Useful hooks in React js include useState, useEffect, useContext, and useRef.
useState: for managing state in functional components
useEffect: for handling side effects in functional components
useContext: for accessing context in functional components
useRef: for accessing DOM elements or values in functional components
Q55. PTP cycle meaning
PTP cycle refers to the Procure-to-Pay cycle, which is the process of obtaining and paying for goods and services.
PTP cycle involves requisitioning, purchasing, receiving, and paying for goods and services.
It starts with a purchase requisition, followed by supplier selection, purchase order creation, goods receipt, invoice verification, and payment processing.
Efficient PTP cycle ensures timely delivery of goods and services while maintaining cost control.
Example: A company fo...read more
More about working at Accenture










Top HR Questions asked in Accenture Team Lead
Interview Process at Accenture Team Lead

Top Team Lead Interview Questions from Similar Companies








Reviews
Interviews
Salaries
Users/Month

