Accenture
1000+ Aanchal Apparels Interview Questions and Answers
Q101. How to convert a column into a row?
Use UNPIVOT operator in SQL to convert a column into a row.
Use UNPIVOT operator in SQL to convert a column into a row
Syntax: SELECT * FROM (SELECT [column_name] FROM [table_name]) AS [alias_name] UNPIVOT ([new_column_name] FOR [old_column_name] IN ([column_name])) AS [alias_name]
Example: SELECT * FROM (SELECT col1, col2, col3 FROM table1) AS t UNPIVOT (val FOR col IN (col1, col2, col3)) AS u
Transpose function in Excel can also be used to convert a column into a row
Q102. If there is a requirement of doing the invoice before pGI , is it possible without making it an order related billing?
Yes, it is possible to create an invoice before pGI without making it an order related billing.
The invoice can be created directly in the billing document without reference to a sales order.
The billing type can be set up to allow for this scenario.
The billing document can be linked to the delivery document instead of the sales order.
This scenario is useful when the customer wants to be invoiced before the goods are delivered.
It is important to ensure that the billing document...read more
Q103. 1.What is Overloading, Overriding, different types of Comstructors . Why do we need it?
Overloading is when multiple methods have the same name but different parameters. Overriding is when a subclass provides a different implementation of a method from its superclass. Constructors are special methods used to initialize objects.
Overloading allows us to have multiple methods with the same name but different parameters, providing flexibility and code reusability.
Overriding allows a subclass to provide its own implementation of a method inherited from its superclass...read more
Q104. What is position absolute and position relative?
Position absolute and position relative are CSS properties used to position elements on a webpage.
Position absolute positions an element relative to its closest positioned ancestor.
Position relative positions an element relative to its normal position on the webpage.
Position absolute elements are taken out of the normal flow of the document.
Position relative elements are still in the normal flow but can be moved from their original position.
Q105. What is the latest Android OS available in the market?
The latest Android OS available in the market is Android 11.
Android 11 was released on September 8, 2020.
It comes with features like improved privacy controls, chat bubbles, and screen recording.
Some of the latest devices that come with Android 11 pre-installed are Google Pixel 5, Samsung Galaxy S21, and OnePlus 9.
Android 11 is the successor to Android 10 and is currently the latest version of the Android operating system.
Q106. What are the risks when dealing with foreign countries and currencies
Dealing with foreign countries and currencies involves risks such as exchange rate fluctuations, political instability, and legal issues.
Exchange rate fluctuations can affect profitability and cash flow
Political instability can lead to changes in regulations and policies
Legal issues such as contract disputes and intellectual property rights violations can arise
Cultural differences can also impact business relationships and communication
Examples include Brexit affecting the va...read more
Q107. What is polymorphism? What is encapsulation? Tell me about the memorable day of your life?
Polymorphism is the ability of a function or method to behave differently based on the object it is acting upon. Encapsulation is the bundling of data and methods that operate on the data into a single unit.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
Encapsulation helps in hiding the internal state of an object and restricting access to it.
Example of polymorphism: Overloading a method with different parameters in a class.
Ex...read more
Q108. What the different types of troubleshooting you have done as a DBA?
Types of troubleshooting as a DBA include performance tuning, backup and recovery issues, security concerns, and database connectivity problems.
Performance tuning - optimizing queries, indexes, and server configurations
Backup and recovery issues - resolving failed backups, restoring data from backups
Security concerns - identifying and fixing vulnerabilities, managing user permissions
Database connectivity problems - troubleshooting network issues, resolving connection errors
Q109. What are different types of directives in Angular?
Directives in Angular are markers on DOM elements that tell Angular to attach a specified behavior to that element.
There are three types of directives in Angular: Component, Structural, and Attribute.
Component directives are used to create reusable UI components.
Structural directives are used to change the structure of the DOM.
Attribute directives are used to change the appearance or behavior of an element.
Examples of built-in directives include ngIf, ngFor, and ngStyle.
Q110. Write a program to implement do while loop
A do while loop is a control flow statement that executes a block of code at least once, and then repeatedly executes the block as long as a specified condition is true.
Initialize a variable outside the loop
Use the do keyword to start the loop
Write the code block to be executed inside the loop
Use the while keyword followed by the condition to continue the loop
Q111. Flow of case creation and bulk email. What is better workflow or plugin?
It depends on the specific requirements and complexity of the case creation and bulk email process.
If the process is simple and straightforward, a workflow may suffice.
If the process involves complex logic and requires frequent updates, a plugin may be a better option.
Consider the cost and time required for development and maintenance of both options.
Evaluate the scalability and performance of both options.
Consult with stakeholders and developers to determine the best approac...read more
Q112. What does Marketing CRM include and explain a marketing Campaign scenario.
Marketing CRM includes customer data management, campaign tracking, lead generation, and customer engagement.
Customer data management involves storing and organizing customer information such as contact details, purchase history, and preferences.
Campaign tracking allows marketers to monitor the performance of their marketing campaigns, including metrics like open rates, click-through rates, and conversions.
Lead generation involves identifying and attracting potential customer...read more
Q113. Difference between Canvas App and Model Driven Apps? Have you integrated any with CRM using customisation
Canvas Apps are highly customizable and visually rich, while Model Driven Apps are more structured and data-driven. Both can be integrated with CRM using customizations.
Canvas Apps allow for more flexibility in design and layout, with drag-and-drop functionality for components.
Model Driven Apps are more focused on data and business processes, with a predefined data model and UI components.
Both types of apps can be customized and integrated with CRM to enhance user experience ...read more
Q114. Difference between partitioning and bucketing in SQL?
Partitioning divides a table into smaller parts while bucketing groups data based on a hash function.
Partitioning is used to improve query performance by reducing the amount of data that needs to be scanned.
Bucketing is used to evenly distribute data across nodes in a cluster.
Partitioning is done based on a column or set of columns, while bucketing is done based on a hash function.
Partitioning is commonly used in databases like Oracle and MySQL, while bucketing is commonly us...read more
Q115. Which modules you have worked most? name some t-code related to them and standard table related to their transaction. explain any scenario you have enhanced in any standard transaction with steps.
I have worked most on SAP MM module. Some t-codes are ME21N, ME51N. Standard table is EKKO.
Worked most on SAP MM module
T-codes: ME21N, ME51N
Standard table: EKKO
Enhanced ME21N transaction to include additional fields
Q116. What are the different kind of filters available in Celonis?
Q117. What is volatile keyword?
Volatile keyword is used to indicate that a variable's value can be changed unexpectedly by external factors.
Volatile keyword is used in multithreaded programming to ensure that the variable's value is always read from memory and not from cache.
It is also used in embedded systems programming to indicate that the variable's value can be changed by hardware interrupts.
Example: volatile int count = 0; // variable can be changed by external factors
Example: int count = 0; // varia...read more
Q118. Guestimates - how many basketball can be fit in a plane
Around 5000 basketballs can fit in a plane.
The size of the plane and basketballs need to be considered.
The packing method can also affect the number of basketballs that can fit.
Assuming a standard commercial plane, around 5000 basketballs can fit.
This is a guestimate and not an exact calculation.
Q119. what is the signification of authorization object in abap. to control the access of object by the assign user only in other way to stop move further into rest of process step.
Authorization objects in ABAP control access to objects for assigned users, preventing unauthorized access.
Authorization objects are used to control access to specific objects in ABAP programs.
They define which users have access to certain objects and what actions they can perform.
Authorization objects are assigned to roles, which are then assigned to users.
Examples of authorization objects include S_PROGRAM for program access and S_TABU_DIS for table maintenance access.
Q120. What are some accessibility standards that are a must have for a WBT?
Some accessibility standards for a WBT include alt text for images, keyboard navigation, and clear language.
Provide alt text for images to assist visually impaired users
Ensure keyboard navigation is possible for users who cannot use a mouse
Use clear and simple language to make content easily understandable for all users
Q121. Cases where you'll build an asset or buy an asset and impact in each scenario
Building or buying assets impact on pricing analysis
Building assets can lead to higher initial costs but lower long-term costs
Buying assets can lead to lower initial costs but higher long-term costs
Building assets can provide more control over the quality and customization of the asset
Buying assets can provide faster access to the asset and potentially better support
Impact on pricing analysis depends on the cost structure and expected lifespan of the asset
Q122. OSPF - what are neighbrship establishment stages in OSPF, what is DR/BDR, what are types of LSAs, is different between type 5 and type 7 LSA, difference between OE1 and OE2, what is virtual link with scenario
Q123. What is purpose of finally, final, Dispose keyword in C#?
finally is used in exception handling, final is a keyword for classes, Dispose is used for releasing unmanaged resources.
finally block is used in exception handling to ensure a piece of code is always executed, whether an exception is thrown or not.
final keyword is used in C# to prevent inheritance or overriding of a method, class, or property.
Dispose method is used to release unmanaged resources like file handles or database connections to prevent memory leaks.
Q124. What is SOLID principle? Name or explain one of them
SOLID is a set of five design principles in object-oriented programming. One of them is the Single Responsibility Principle (SRP).
SRP states that a class should have only one reason to change, meaning it should only have one job or responsibility.
For example, a class that handles both user authentication and database operations violates SRP. It should be split into two separate classes.
SRP helps in making code more maintainable, testable, and easier to understand.
Q125. What microsoft certifications you hold? How many are pending renewals
I hold Microsoft certifications in Azure and SQL Server. No pending renewals.
Certifications in Azure and SQL Server
No pending renewals
Q126. Follow-up Question:- How do you maintain the code for Dev/QA/Production?
Code is maintained using version control systems like Git, with separate branches for Dev, QA, and Production.
Use version control systems like Git to track changes and manage code.
Create separate branches for Dev, QA, and Production to isolate changes and prevent conflicts.
Implement a code review process to ensure quality and consistency across environments.
Automate deployment processes to easily promote code changes from one environment to another.
Regularly update dependenci...read more
Q127. OOPs concept. How do we implement/use/purpose for Encapsulation, Abstraction?
Encapsulation is the concept of bundling data and methods that operate on the data into a single unit. Abstraction is the concept of hiding the implementation details and showing only the necessary features of an object.
Encapsulation helps in data hiding and prevents direct access to data from outside the class.
Abstraction helps in reducing complexity by hiding unnecessary details and showing only essential features.
Encapsulation is achieved by using access modifiers like pri...read more
Q128. what is the marker interface and when and where to use interface?
Marker interface is an empty interface used to mark a class as having a particular property or behavior.
Marker interface has no methods or fields, it is used to provide metadata to the code.
It is used to indicate that a class has a certain capability or should be treated in a special way.
Examples of marker interfaces are Serializable, Cloneable, and Remote.
Interfaces are used to achieve abstraction and provide a contract for implementing classes.
Interfaces are used to achieve...read more
Q129. Did you face any challenge while creating the DevOps pipeline?
Yes, I faced challenges while creating the DevOps pipeline.
One challenge was integrating multiple tools and technologies into the pipeline.
Another challenge was ensuring smooth communication and collaboration between different teams involved in the pipeline.
I also faced challenges in automating the testing and deployment processes to achieve continuous integration and continuous delivery.
Dealing with legacy systems and transitioning them into the new pipeline was also a chall...read more
Q130. Can you tell me something about Ansible work in DevOps?
Ansible is a popular automation tool used in DevOps for configuration management, application deployment, and orchestration.
Ansible is agentless, meaning it does not require any software to be installed on the nodes being managed.
It uses YAML syntax for writing playbooks, which are used to define automation tasks.
Ansible can be used for tasks such as provisioning servers, deploying applications, and managing configurations.
It allows for easy scaling and automation of repetiti...read more
Q131. What is the difference b/w Continuous delivery and continuous deployment?
Continuous delivery focuses on automating the software delivery process up to production, while continuous deployment automatically deploys every change to production.
Continuous delivery involves automating the software delivery process up to production, ensuring that code is always in a deployable state.
Continuous deployment goes a step further by automatically deploying every change that passes automated tests to production.
Continuous delivery allows for manual approval bef...read more
Q132. What do you mean by break function?
A break function is a statement used to exit a loop or switch statement.
It is used to terminate a loop or switch statement before its natural end.
It can be used with conditions to exit a loop when a certain condition is met.
Examples include 'break' in Java and C++ and 'exit' in Python.
Q133. How will you design security for global implementation?
Designing security for global implementation involves considering various factors and implementing a comprehensive strategy.
Conduct a thorough risk assessment to identify potential vulnerabilities and threats
Implement strong access controls and authentication mechanisms
Encrypt sensitive data both in transit and at rest
Establish a robust incident response plan
Regularly update and patch systems to address security vulnerabilities
Implement network segmentation to limit the impac...read more
Q134. four pillars of oops
Four pillars of OOPs are Abstraction, Encapsulation, Inheritance, and Polymorphism.
Abstraction: Hiding implementation details and showing only necessary information.
Encapsulation: Binding data and functions together and restricting access to them.
Inheritance: Acquiring properties and behavior of a parent class by a child class.
Polymorphism: Ability of an object to take many forms and perform different actions based on the context.
Q135. which authentication methods used to secure rest api
Various authentication methods can be used to secure REST API, including OAuth, JWT, Basic Authentication, and API Keys.
OAuth is a popular authentication method that allows users to grant access to third-party applications without sharing their credentials.
JWT (JSON Web Tokens) is a stateless authentication mechanism that uses a token to authenticate users.
Basic Authentication uses a username and password to authenticate users.
API Keys are unique identifiers that are used to ...read more
Q136. What are the benefits of application developer
Application developers benefit from job flexibility, high demand, and competitive salaries.
Job flexibility allows developers to work remotely or on a flexible schedule
High demand for skilled developers ensures job security and opportunities for growth
Competitive salaries in the tech industry offer financial stability and potential for advancement
Q137. Explain exception handling and which ways you used to handle it.
Exception handling is a way to handle errors and unexpected events in a program.
Exception handling is used to prevent a program from crashing when an error occurs.
It involves catching and handling exceptions using try-catch blocks.
Different types of exceptions can be handled differently.
Examples of exception handling include logging the error, displaying a user-friendly message, or retrying the operation.
In Java, exceptions are represented by classes and can be customized to ...read more
Q138. Explain the scenario & What u do with CSRF Vulnerability
CSRF vulnerability allows attackers to perform actions on behalf of a user without their consent.
CSRF attacks can be prevented by implementing CSRF tokens
The token is generated by the server and included in the form or URL
When the form is submitted, the token is verified to ensure it matches the one generated by the server
If the token is invalid, the request is rejected
CSRF vulnerabilities can be exploited to perform actions such as changing passwords, making purchases, or de...read more
Q139. How can broken authorisation vulnerability be extended
Broken authorization vulnerability can be extended by exploiting other vulnerabilities or by using stolen credentials.
Exploiting other vulnerabilities such as SQL injection or cross-site scripting to gain unauthorized access
Using stolen credentials to bypass authorization checks
Exploiting misconfigured access controls to gain elevated privileges
Using brute force attacks to guess valid credentials
Exploiting session management vulnerabilities to hijack user sessions
Q140. What is KPI and it's other factors
KPI stands for Key Performance Indicator. It is a measurable value that demonstrates how effectively a company is achieving its key business objectives.
KPIs are used to evaluate the success of an organization or of a particular activity in which it engages.
They help to identify areas that require improvement and to set goals for improvement.
KPIs can be financial or non-financial, qualitative or quantitative, and can be used at various levels within an organization.
Examples of...read more
Q141. How would you monitor a db performance with OEM AWR report?
Monitoring db performance using OEM AWR report
Access OEM console and navigate to Performance tab
Select AWR report option to generate a report
Analyze the report for key performance metrics like CPU usage, memory utilization, I/O stats
Identify any performance bottlenecks and take necessary actions to optimize db performance
Q142. What is the difference between header and exchange property of content modifier
Header and exchange properties are used in content modifier to manipulate message headers and exchange properties respectively.
Header properties are used to manipulate message headers while exchange properties are used to manipulate exchange properties.
Header properties are specific to a message while exchange properties are specific to an exchange.
Header properties can be accessed using the message object while exchange properties can be accessed using the exchange object.
Ex...read more
Q143. 1. What are the main components of CAM(MSME etc)?.
CAM (MSME etc) has components like financial assistance, technology upgradation, marketing support, and skill development.
Financial assistance: loans, subsidies, grants, etc.
Technology upgradation: modernization of machinery, equipment, etc.
Marketing support: promotion, branding, advertising, etc.
Skill development: training, workshops, seminars, etc.
Examples: MSME has schemes like Credit Guarantee Fund Trust for Micro and Small Enterprises, Prime Minister's Employment Generat...read more
Q144. Infrastructure of the application from resume, how to handle the non performing the member
To handle non-performing team members in application infrastructure
Identify the root cause of non-performance
Provide feedback and coaching to improve performance
Set clear expectations and goals
Offer additional training or resources
Consider reassigning or terminating the team member if necessary
Q145. What type of vulnerabilities are over there?
There are various types of vulnerabilities such as SQL injection, cross-site scripting, buffer overflow, etc.
SQL injection: attackers inject malicious SQL code to gain unauthorized access to the database
Cross-site scripting: attackers inject malicious scripts into a website to steal user data
Buffer overflow: attackers exploit a program's buffer to execute malicious code
Other types include CSRF, DoS, and privilege escalation
Vulnerabilities can exist in software, hardware, and ...read more
Q146. Is a mnc company or not?.
The question is asking whether a company is an MNC or not.
MNC stands for Multinational Corporation.
An MNC is a company that operates in multiple countries and has a global presence.
They typically have subsidiaries or branches in different countries.
MNCs often have a diverse workforce and cater to international markets.
Examples of MNCs include Apple Inc., Google, and Coca-Cola.
Q147. What is Routing? Have you heard about Conventional Routing?
Routing is the process of directing network traffic to its destination. Conventional Routing is a method of defining routes based on conventions.
Routing is the process of determining the path that network packets should take from the source to the destination.
Conventional Routing involves defining routes based on conventions or predefined rules.
In web development, routing refers to mapping URLs to specific controllers and actions in an application.
Conventional Routing in ASP....read more
Q148. What is Difference Between Depreciation and Amortization?
Depreciation is the allocation of the cost of tangible assets over their useful life, while amortization is the allocation of the cost of intangible assets over their useful life.
Depreciation applies to tangible assets like buildings, machinery, and vehicles, while amortization applies to intangible assets like patents, copyrights, and trademarks.
Depreciation is usually calculated using methods like straight-line or accelerated depreciation, while amortization is typically ca...read more
Q149. Route guards and how to implement them?
Route guards are used to control access to routes in Angular applications.
Route guards are used to protect routes from unauthorized access.
They can be used to check if a user is authenticated or has certain permissions before allowing access to a route.
There are three types of route guards in Angular: CanActivate, CanActivateChild, and CanLoad.
CanActivate is used to determine if a route can be activated.
CanActivateChild is used to determine if a child route can be activated.
C...read more
Q150. How to go back my previous version in new developed smartforms by retrieving the previous version in it .
To retrieve a previous version of a smartform in SAP ABAP, you can use the transport request system.
Use the transport request system to track changes and versions of smartforms.
Identify the transport request containing the previous version of the smartform.
Import the transport request to revert back to the previous version.
Ensure to test the smartform after reverting to the previous version.
Q151. If you have worked on SuccessFactors then which are the areas of successfactors you have worked on.
I have worked on SuccessFactors in the areas of Employee Central, Performance & Goals, and Learning.
Employee Central - managing employee data, organizational structure, and workflows
Performance & Goals - setting goals, performance reviews, and feedback
Learning - managing training courses and certifications
Example: Configured employee data fields and workflows in Employee Central
Example: Created performance review templates and managed goal setting in Performance & Goals
Exampl...read more
Q152. What are the different types of DDIC tables ?
DDIC tables are used in SAP systems to store metadata and data dictionary information.
Transparent tables: store application data and have a one-to-one relationship with the database table
Pooled tables: store control data and have a one-to-many relationship with the database table
Cluster tables: store data from multiple tables with a one-to-many relationship
View tables: virtual tables that display data from other tables without storing it physically
Q153. When and how do we configure database connections in JDeveloper, and what are the differences between WSDLs?
Database connections in JDeveloper are configured in the application's deployment descriptor file. WSDLs are XML-based descriptions of web services.
Database connections in JDeveloper are configured in the application's deployment descriptor file, typically web.xml or persistence.xml.
The configuration includes details such as database URL, username, password, and driver class.
WSDLs (Web Services Description Language) are XML-based descriptions of web services, defining the ope...read more
Q154. What is amortization how do you calculates
Amortization is the process of spreading out a loan into smaller, regular payments over a period of time.
Calculate the periodic payment by dividing the total loan amount by the number of payments
Calculate the interest portion of the payment by multiplying the outstanding balance by the interest rate
Calculate the principal portion of the payment by subtracting the interest portion from the periodic payment
Repeat the process for each payment period until the loan is fully paid ...read more
Q155. How do you give access to users via az portal
To give access to users via az portal, follow these steps:
Log in to the Azure portal
Navigate to the resource you want to give access to
Click on the 'Access control (IAM)' tab
Click on the 'Add' button
Select the role you want to assign to the user
Enter the user's email address or select from the list of existing users
Click on the 'Save' button
Q156. What are different types of function module in SAP?
There are three types of function modules in SAP: 1) Function modules with interface 2) Function modules without interface 3) Function modules as methods of a class.
Function modules with interface are used for external communication
Function modules without interface are used for internal communication
Function modules as methods of a class are used for object-oriented programming
Examples of function modules with interface are RFC_READ_TABLE and RFC_GET_SYSTEM_INFO
Examples of f...read more
Q157. What are different drivers for Forecasting and Demand sensing?
Forecasting and demand sensing have different drivers.
Forecasting is driven by historical data and trends.
Demand sensing is driven by real-time data and market changes.
Forecasting is used for long-term planning and production.
Demand sensing is used for short-term adjustments and inventory management.
Forecasting is more accurate for stable markets, while demand sensing is better for volatile markets.
Examples of forecasting drivers include seasonality, product lifecycle, and ma...read more
Q158. 1. Scrum Ceremonies 2. Conflict Resolution 3. How to handle last minute changes 4. Planning techniques 5. Day to day activities as Scrum Master 6. Agile Metrics etc
The interview covered Scrum ceremonies, conflict resolution, handling last minute changes, planning techniques, day-to-day activities as Scrum Master, and Agile metrics.
Scrum ceremonies include Sprint Planning, Daily Scrum, Sprint Review, and Sprint Retrospective.
Conflict resolution involves identifying the root cause, facilitating communication, and finding a mutually beneficial solution.
Handling last minute changes requires assessing the impact on the project, communicating...read more
Q159. What is the difference between String StringBuffer
String is immutable, StringBuffer is mutable in Java.
String is immutable, meaning once created, it cannot be changed. StringBuffer is mutable, allowing for modifications.
StringBuffer is synchronized, making it thread-safe. String is not synchronized.
StringBuffer is more efficient for concatenating multiple strings due to mutability.
Example: String str = "Hello"; StringBuffer sb = new StringBuffer("Hello");
Q160. Write query to fetch all employees name from database which starts from a alphabet.
Query to fetch employees whose names start with a specific alphabet.
Use SQL query with LIKE operator and wildcard character %.
Example: SELECT name FROM employees WHERE name LIKE 'A%';
Q161. How to improve performance of iOS app?
To improve performance of iOS app, optimize code, reduce network calls, use efficient data storage, and implement caching.
Optimize code by identifying and fixing memory leaks, reducing unnecessary computations, and using efficient algorithms.
Reduce network calls by batching requests, using background fetch and push notifications, and implementing prefetching.
Use efficient data storage by utilizing Core Data, Realm, or SQLite for local storage, and optimizing data structures.
I...read more
Q162. In what scenarios do you find the usage of interfaces to be most appropriate?
Interfaces are most appropriate in scenarios where multiple classes need to implement common methods or behaviors.
When you want to define a contract that multiple classes must adhere to
When you want to achieve loose coupling between classes
When you want to support multiple implementations of a feature
When you want to enable polymorphism in your code
Q163. What are the features of Java 8 and how are they used?
Java 8 introduced several new features including lambda expressions, functional interfaces, streams, and default methods.
Lambda expressions allow you to write code in a more concise and readable way.
Functional interfaces are interfaces with a single abstract method, which can be implemented using lambda expressions.
Streams provide a way to work with sequences of elements and perform operations such as filter, map, and reduce.
Default methods allow interfaces to have method imp...read more
Q164. How I will handle issue or escalation from client
I will listen to the client's concerns, empathize with them, and work towards finding a solution that satisfies both parties.
Listen actively to the client's concerns and acknowledge their feelings
Apologize for any inconvenience caused and assure them that their issue will be resolved
Work with the team to find a solution that meets the client's needs
Communicate the solution to the client and follow up to ensure their satisfaction
Q165. What are the different type of selections available in Celonis?
Q166. How to improve parallel processing for a function app?
Improve parallel processing for a function app
Use asynchronous programming to allow multiple tasks to run concurrently
Consider using a distributed computing framework like Apache Spark
Optimize code for parallelism by breaking down tasks into smaller chunks
Use caching to reduce the need for repeated computations
Ensure that the hardware and infrastructure can support parallel processing
Q167. What is debit cames in and credit go out tell me explain
Debit represents incoming funds while credit represents outgoing funds.
Debit is used to record an increase in assets or a decrease in liabilities or equity.
Credit is used to record a decrease in assets or an increase in liabilities or equity.
For example, when a company receives cash from a customer, it would debit cash and credit accounts receivable.
Conversely, when a company pays a supplier, it would credit cash and debit accounts payable.
Q168. What is Pipe? What are the types? How to write custom pipe?
A pipe is a feature in Angular that allows you to transform data in templates. There are built-in pipes and you can also create custom pipes.
Types of pipes include built-in pipes like DatePipe, UpperCasePipe, LowerCasePipe, etc.
Custom pipes can be created by using the @Pipe decorator and implementing the PipeTransform interface.
To write a custom pipe, first create a new TypeScript file for the pipe, define the pipe class with @Pipe decorator, implement PipeTransform interface...read more
Q169. How many hairs you have on your head?
The number of hairs on a person's head varies, but on average, it is around 100,000.
The number of hairs on a person's head can vary depending on factors such as genetics, age, and health.
On average, adults have around 100,000 hairs on their head.
Hair loss is a common issue that can affect the number of hairs on the head.
Hair color and texture can also impact the appearance of hair density.
Q170. How many connectors have you worked with in power Apps
I have worked with over 20 connectors in Power Apps, including SharePoint, Outlook, and SQL Server.
Worked with over 20 connectors in Power Apps
Familiar with connectors such as SharePoint, Outlook, and SQL Server
Q171. What's ICSR, Susar and other things!
ICSR is Individual Case Safety Report and SUSAR is Suspected Unexpected Serious Adverse Reaction.
ICSR is a report of an adverse event or reaction that occurs in an individual patient.
SUSAR is an adverse reaction that is both unexpected and serious.
Pharmacovigilance associates are responsible for collecting and analyzing ICSRs to ensure drug safety.
Other important terms in pharmacovigilance include ADR (adverse drug reaction), SAE (serious adverse event), and CIOMS (Council fo...read more
Q172. What is transient keyword?
Transient keyword is used in Java to indicate that a variable should not be serialized.
Transient keyword is used with variables to exclude them from serialization process.
It is used to mark a variable as non-persistent.
Transient variables are not saved during serialization and are initialized to default value during deserialization.
Example: private transient int age; // age will not be serialized
Q173. What are the technical chalanges which came during implementation of the project?
The technical challenges during project implementation
Integration with legacy systems
Ensuring data security and privacy
Optimizing performance and scalability
Dealing with compatibility issues across different platforms
Implementing complex business logic
Managing dependencies and version control
Q174. How will you optimize the code from where you got to know what is my efficiency of my code i.e. ATC check?
To optimize code and check efficiency, use ATC checks in SAP ABAP Hana development.
Use ATC (ABAP Test Cockpit) checks to analyze code quality and performance.
ATC checks can identify potential issues such as performance bottlenecks, security vulnerabilities, and coding standards violations.
Optimize code based on ATC check results to improve efficiency and maintainability.
Regularly run ATC checks to ensure code quality and performance standards are met.
Examples: Fixing ineffici...read more
Q175. What syntax you feel as a difference in select(7.5) statement when it comes for HANA as compared to ECC?
In HANA, select(7.5) statement allows for specifying the number of records to be fetched at a time.
In HANA, you can use the addition 'UP TO n ROWS' to limit the number of records fetched.
In ECC, there is no such addition available in the select statement.
Example: SELECT * FROM table_name INTO @DATA(lt_data) UP TO 100 ROWS.
Q176. Were you required to perform a VLOOKUP and HOOKUP practically with a large dataset? ( asked to do it practically )
Yes, I have experience performing VLOOKUP and HLOOKUP with large datasets.
Yes, I have used VLOOKUP to search for specific data in a large Excel spreadsheet.
I have also used HLOOKUP to search for data in rows instead of columns.
Practical examples include using VLOOKUP to match employee IDs with their corresponding information.
Q177. 2. How do you access risk in any project?
Risk assessment involves identifying potential risks and evaluating their likelihood and impact on the project.
Identify potential risks and their impact on the project
Evaluate the likelihood of each risk occurring
Assess the severity of the impact of each risk
Develop a risk management plan to mitigate or avoid identified risks
Regularly review and update the risk management plan throughout the project
Q178. What's EDR and explain what happens after it finds a malicious file in the device?
Q179. What is cursor? What is REF CURSOR? Write the syntax for Before Insert row trigger What are all the DBMS_*** packages u have used? What are exceptions and how it is handled? What are Partitions and what is exch...
read moreA cursor is a database object used to retrieve data row by row, while a REF CURSOR is a pointer to a cursor result set.
Cursor is used to fetch data row by row in a database query.
REF CURSOR is a pointer to a cursor result set, allowing it to be passed between PL/SQL programs.
Syntax for Before Insert row trigger: CREATE OR REPLACE TRIGGER trigger_name BEFORE INSERT ON table_name FOR EACH ROW BEGIN ... END;
DBMS_*** packages are built-in packages in Oracle for various functional...read more
Q180. How can digital initiatives help in building a resilient organization?
Digital initiatives can enhance organizational resilience through increased agility, efficiency, and innovation.
Digital tools can enable remote work and collaboration, ensuring business continuity during disruptions.
Data analytics can provide real-time insights for informed decision-making and risk management.
Automation can streamline processes and reduce costs, freeing up resources for strategic investments.
Digital platforms can facilitate customer engagement and feedback, d...read more
Q181. What type of mobile application did u test?
I have tested various types of mobile applications including social media, e-commerce, and banking apps.
I have tested social media apps like Facebook, Twitter, and Instagram
I have tested e-commerce apps like Amazon, Flipkart, and eBay
I have tested banking apps like Chase, Bank of America, and Wells Fargo
Q182. If I could use only one statement to review the overall health of a company, which statement would I use, and why? ...
The statement that would best review the overall health of a company is the income statement.
The income statement provides a comprehensive overview of a company's financial performance over a specific period.
It shows the company's revenues, expenses, and net income, allowing for analysis of profitability.
By examining the income statement, one can assess the company's ability to generate profits and manage costs.
It also helps in evaluating the company's revenue growth, margins...read more
Q183. Explain the different types of Database backups and backup strategies used in your current organisation
Different types of database backups include full, incremental, differential, and snapshot backups.
Full backups: Backs up the entire database
Incremental backups: Backs up only the data that has changed since the last backup
Differential backups: Backs up all changes made since the last full backup
Snapshot backups: Captures the state of the database at a specific point in time
Backup strategies may include a combination of these types to ensure data integrity and minimize downtim...read more
Q184. What is entry of prepaid expense?
Prepaid expense is an accounting concept where an expense is paid in advance before it is incurred.
Prepaid expense is recorded as an asset on the balance sheet.
It is gradually recognized as an expense over time or as the benefit is received.
Common examples of prepaid expenses include prepaid rent, prepaid insurance, and prepaid subscriptions.
To record the entry of prepaid expense, debit the prepaid expense account and credit the cash or accounts payable account.
As the prepaid...read more
Q185. What is the treatment for bad debts received.
Bad debts received are written off as an expense in the income statement.
Bad debts are uncollectible debts that are written off as an expense in the income statement.
The amount of bad debts is subtracted from the accounts receivable balance.
The entry to write off bad debts is a debit to bad debt expense and a credit to accounts receivable.
The write-off of bad debts reduces the company's net income and assets.
Example: If a company has $10,000 in accounts receivable and $500 in...read more
Q186. Difference between For and While loop
For loop is used when the number of iterations is known, while loop is used when the condition is true.
For loop is used when the number of iterations is known beforehand.
While loop is used when the condition needs to be checked before each iteration.
For loop is more concise and easier to read for simple iterations.
While loop is more flexible and can handle complex conditions.
Example: for(int i=0; i<5; i++) { //code }
Example: while(condition) { //code }
Q187. Swap two integers without temp variable
Use bitwise XOR operation to swap two integers without a temp variable.
Use XOR operation to swap two integers: a ^= b, b ^= a, a ^= b
Example: int a = 5, b = 10; a ^= b; b ^= a; a ^= b; // Now a = 10, b = 5
Q188. what is the use of container to development abap object. to display output in the screen container is used .
Containers are used in ABAP development to display output on the screen.
Containers are used to hold and display UI elements in ABAP programs.
They can be used to display text, images, tables, and other UI components.
Containers can be added to screens using the SAP GUI for Windows or Web Dynpro ABAP technology.
Example: DATA container TYPE REF TO cl_gui_container.
Example: container->add( text ).
Q189. What is the difference between implicit and explicit enhancement?
Implicit enhancements are modifications made to standard SAP objects without modifying the original code, while explicit enhancements involve adding custom code directly into the standard SAP objects.
Implicit enhancements are done using enhancement points or sections provided by SAP, allowing developers to add custom code without modifying the original object.
Explicit enhancements involve directly modifying the standard SAP object by adding custom code within the object itsel...read more
Q190. What do know about Machine Learning?
Machine learning is a subset of artificial intelligence that involves training algorithms to make predictions or decisions based on data.
Machine learning algorithms can be supervised, unsupervised, or semi-supervised
Examples of machine learning include image recognition, natural language processing, and recommendation systems
Machine learning requires large amounts of data to train algorithms effectively
Popular machine learning frameworks include TensorFlow, Scikit-learn, and ...read more
Q191. What is final account and balance sheet. difference between.
Final account and balance sheet are financial statements used to summarize a company's financial position.
Final account is a statement of all the accounts in a ledger, showing the balances of each account.
Balance sheet is a financial statement that shows a company's assets, liabilities, and equity at a specific point in time.
Final account is prepared before the balance sheet.
Balance sheet is prepared after the final account.
Final account is used to prepare the balance sheet.
B...read more
Q192. Cases when Singleton Design pattern fails.
Singleton pattern fails when it violates SOLID principles or when multiple instances are required.
Singleton pattern can make testing difficult as it tightly couples the code
It can also lead to global state and make the code harder to reason about
If multiple instances are required, Singleton pattern cannot be used
In a distributed system, Singleton pattern can lead to synchronization issues
If the Singleton class is not thread-safe, it can lead to race conditions
Examples of alte...read more
Q193. Example- Explain STO process? How will you differentiate if a PO with document type NB is an STO.
STO process is a Stock Transport Order process used to transfer goods between plants in different locations.
STO process involves creating a purchase order (PO) with document type UB.
The delivering plant creates a delivery document and the receiving plant creates a goods receipt document.
If a PO with document type NB is an STO, it means that it is not an STO but a standard PO for external procurement.
The document type NB is used for standard POs while UB is used for STOs.
Q194. Difference between Release and Build Pipeline in Azure?
Release pipeline is for deploying code to production, build pipeline is for compiling code.
Release pipeline is used for deploying code to production environment after successful testing.
Build pipeline is used for compiling source code into executable code or artifacts.
Release pipeline includes stages like Dev, Test, and Prod for deployment.
Build pipeline includes tasks like compiling code, running tests, and packaging artifacts.
Example: In Azure DevOps, you can create separat...read more
Q195. What do you mean by defect density?
Defect density refers to the number of defects found in a software component or system per unit of size or complexity.
Defect density is a metric used to measure the quality of software.
It is calculated by dividing the number of defects by the size or complexity of the software component or system.
Defect density can be used to identify areas of the software that need improvement.
For example, if a software component has a high defect density, it may indicate that there are issu...read more
Q196. What is record producer? How many ways we can call server script in client side? Few servicenow best practices we should follow. Workflow activities.
Record producer is a feature in ServiceNow that allows users to create records in a guided manner.
Record producer provides a user-friendly interface for creating records with predefined templates and fields.
Server scripts can be called in client side using GlideAjax, g_form.getReference, and g_scratchpad.
Some ServiceNow best practices include using naming conventions, documenting changes, and testing in sub-production instances.
Workflow activities in ServiceNow include approv...read more
Q197. What are the steps to add a shared mailbox in the Outlook client? Why might it be difficult to uninstall an application at times?
To add a shared mailbox in Outlook, you need to have the necessary permissions and follow specific steps. Uninstalling an application can be difficult due to dependencies and system restrictions.
Ensure you have the necessary permissions to access the shared mailbox
In Outlook, go to File > Account Settings > Account Settings
Select your email account and click Change
Click More Settings > Advanced tab > Add
Enter the email address of the shared mailbox and click OK
To uninstall an...read more
Q198. What will happen if the server crashes
If the server crashes, the website or application will become unavailable until the server is restored.
Website or application will be inaccessible to users
Data may be lost if not properly backed up
Potential impact on business operations and revenue
Need to investigate the cause of the crash and implement measures to prevent future occurrences
Q199. What is CDS Views ? Syntax to create parameter based views? syntax to create Association. How to publish CDS views
CDS Views are virtual database views in SAP HANA. They can be parameter-based and have associations. They are published using annotations.
CDS Views are virtual database views in SAP HANA
Syntax to create parameter-based views: @AbapCatalog.sqlViewName: 'view_name' @AccessControl.authorizationCheck: #NOT_REQUIRED define view view_name(parameter_name) as select from table_name where field_name = :parameter_name
Syntax to create Association: define view view_name as select from en...read more
Q200. What is the use of Authorization how it is helpful explain with any example? how its created? have you ever?
Authorization in SAP ABAP Hana Developer is used to control access to specific functionalities or data within the system.
Authorization is helpful in ensuring that only authorized users can perform certain actions or access certain data in the system.
It helps in maintaining data security and preventing unauthorized access.
Authorizations are created using roles, profiles, and authorization objects in SAP.
For example, a user may be assigned a role that allows them to create purc...read more
More about working at Accenture
Top HR Questions asked in Aanchal Apparels
Interview Process at Aanchal Apparels
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month