Add office photos
Employer?
Claim Account for FREE

Accenture

3.8
based on 56.4k Reviews
Video summary
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

1000+ Aanchal Apparels Interview Questions and Answers

Updated 28 Feb 2025
Popular Designations

Q101. How to convert a column into a row?

Ans.

Use UNPIVOT operator in SQL to convert a column into a row.

  • Use UNPIVOT operator in SQL to convert a column into a row

  • Syntax: SELECT * FROM (SELECT [column_name] FROM [table_name]) AS [alias_name] UNPIVOT ([new_column_name] FOR [old_column_name] IN ([column_name])) AS [alias_name]

  • Example: SELECT * FROM (SELECT col1, col2, col3 FROM table1) AS t UNPIVOT (val FOR col IN (col1, col2, col3)) AS u

  • Transpose function in Excel can also be used to convert a column into a row

Add your answer

Q102. If there is a requirement of doing the invoice before pGI , is it possible without making it an order related billing?

Ans.

Yes, it is possible to create an invoice before pGI without making it an order related billing.

  • The invoice can be created directly in the billing document without reference to a sales order.

  • The billing type can be set up to allow for this scenario.

  • The billing document can be linked to the delivery document instead of the sales order.

  • This scenario is useful when the customer wants to be invoiced before the goods are delivered.

  • It is important to ensure that the billing document...read more

Add your answer

Q103. 1.What is Overloading, Overriding, different types of Comstructors . Why do we need it?

Ans.

Overloading is when multiple methods have the same name but different parameters. Overriding is when a subclass provides a different implementation of a method from its superclass. Constructors are special methods used to initialize objects.

  • Overloading allows us to have multiple methods with the same name but different parameters, providing flexibility and code reusability.

  • Overriding allows a subclass to provide its own implementation of a method inherited from its superclass...read more

View 1 answer

Q104. What is position absolute and position relative?

Ans.

Position absolute and position relative are CSS properties used to position elements on a webpage.

  • Position absolute positions an element relative to its closest positioned ancestor.

  • Position relative positions an element relative to its normal position on the webpage.

  • Position absolute elements are taken out of the normal flow of the document.

  • Position relative elements are still in the normal flow but can be moved from their original position.

Add your answer
Discover Aanchal Apparels interview dos and don'ts from real experiences

Q105. What is the latest Android OS available in the market?

Ans.

The latest Android OS available in the market is Android 11.

  • Android 11 was released on September 8, 2020.

  • It comes with features like improved privacy controls, chat bubbles, and screen recording.

  • Some of the latest devices that come with Android 11 pre-installed are Google Pixel 5, Samsung Galaxy S21, and OnePlus 9.

  • Android 11 is the successor to Android 10 and is currently the latest version of the Android operating system.

View 1 answer

Q106. What are the risks when dealing with foreign countries and currencies

Ans.

Dealing with foreign countries and currencies involves risks such as exchange rate fluctuations, political instability, and legal issues.

  • Exchange rate fluctuations can affect profitability and cash flow

  • Political instability can lead to changes in regulations and policies

  • Legal issues such as contract disputes and intellectual property rights violations can arise

  • Cultural differences can also impact business relationships and communication

  • Examples include Brexit affecting the va...read more

Add your answer
Are these interview questions helpful?

Q107. What is polymorphism? What is encapsulation? Tell me about the memorable day of your life?

Ans.

Polymorphism is the ability of a function or method to behave differently based on the object it is acting upon. Encapsulation is the bundling of data and methods that operate on the data into a single unit.

  • Polymorphism allows objects of different classes to be treated as objects of a common superclass.

  • Encapsulation helps in hiding the internal state of an object and restricting access to it.

  • Example of polymorphism: Overloading a method with different parameters in a class.

  • Ex...read more

Add your answer

Q108. What the different types of troubleshooting you have done as a DBA?

Ans.

Types of troubleshooting as a DBA include performance tuning, backup and recovery issues, security concerns, and database connectivity problems.

  • Performance tuning - optimizing queries, indexes, and server configurations

  • Backup and recovery issues - resolving failed backups, restoring data from backups

  • Security concerns - identifying and fixing vulnerabilities, managing user permissions

  • Database connectivity problems - troubleshooting network issues, resolving connection errors

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q109. What are different types of directives in Angular?

Ans.

Directives in Angular are markers on DOM elements that tell Angular to attach a specified behavior to that element.

  • There are three types of directives in Angular: Component, Structural, and Attribute.

  • Component directives are used to create reusable UI components.

  • Structural directives are used to change the structure of the DOM.

  • Attribute directives are used to change the appearance or behavior of an element.

  • Examples of built-in directives include ngIf, ngFor, and ngStyle.

Add your answer

Q110. Write a program to implement do while loop

Ans.

A do while loop is a control flow statement that executes a block of code at least once, and then repeatedly executes the block as long as a specified condition is true.

  • Initialize a variable outside the loop

  • Use the do keyword to start the loop

  • Write the code block to be executed inside the loop

  • Use the while keyword followed by the condition to continue the loop

Add your answer

Q111. Flow of case creation and bulk email. What is better workflow or plugin?

Ans.

It depends on the specific requirements and complexity of the case creation and bulk email process.

  • If the process is simple and straightforward, a workflow may suffice.

  • If the process involves complex logic and requires frequent updates, a plugin may be a better option.

  • Consider the cost and time required for development and maintenance of both options.

  • Evaluate the scalability and performance of both options.

  • Consult with stakeholders and developers to determine the best approac...read more

Add your answer

Q112. What does Marketing CRM include and explain a marketing Campaign scenario.

Ans.

Marketing CRM includes customer data management, campaign tracking, lead generation, and customer engagement.

  • Customer data management involves storing and organizing customer information such as contact details, purchase history, and preferences.

  • Campaign tracking allows marketers to monitor the performance of their marketing campaigns, including metrics like open rates, click-through rates, and conversions.

  • Lead generation involves identifying and attracting potential customer...read more

Add your answer

Q113. Difference between Canvas App and Model Driven Apps? Have you integrated any with CRM using customisation

Ans.

Canvas Apps are highly customizable and visually rich, while Model Driven Apps are more structured and data-driven. Both can be integrated with CRM using customizations.

  • Canvas Apps allow for more flexibility in design and layout, with drag-and-drop functionality for components.

  • Model Driven Apps are more focused on data and business processes, with a predefined data model and UI components.

  • Both types of apps can be customized and integrated with CRM to enhance user experience ...read more

Add your answer

Q114. Difference between partitioning and bucketing in SQL?

Ans.

Partitioning divides a table into smaller parts while bucketing groups data based on a hash function.

  • Partitioning is used to improve query performance by reducing the amount of data that needs to be scanned.

  • Bucketing is used to evenly distribute data across nodes in a cluster.

  • Partitioning is done based on a column or set of columns, while bucketing is done based on a hash function.

  • Partitioning is commonly used in databases like Oracle and MySQL, while bucketing is commonly us...read more

Add your answer

Q115. Which modules you have worked most? name some t-code related to them and standard table related to their transaction. explain any scenario you have enhanced in any standard transaction with steps.

Ans.

I have worked most on SAP MM module. Some t-codes are ME21N, ME51N. Standard table is EKKO.

  • Worked most on SAP MM module

  • T-codes: ME21N, ME51N

  • Standard table: EKKO

  • Enhanced ME21N transaction to include additional fields

Add your answer

Q116. What are the different kind of filters available in Celonis?

Add your answer

Q117. What is volatile keyword?

Ans.

Volatile keyword is used to indicate that a variable's value can be changed unexpectedly by external factors.

  • Volatile keyword is used in multithreaded programming to ensure that the variable's value is always read from memory and not from cache.

  • It is also used in embedded systems programming to indicate that the variable's value can be changed by hardware interrupts.

  • Example: volatile int count = 0; // variable can be changed by external factors

  • Example: int count = 0; // varia...read more

View 1 answer

Q118. Guestimates - how many basketball can be fit in a plane

Ans.

Around 5000 basketballs can fit in a plane.

  • The size of the plane and basketballs need to be considered.

  • The packing method can also affect the number of basketballs that can fit.

  • Assuming a standard commercial plane, around 5000 basketballs can fit.

  • This is a guestimate and not an exact calculation.

View 1 answer

Q119. what is the signification of authorization object in abap. to control the access of object by the assign user only in other way to stop move further into rest of process step.

Ans.

Authorization objects in ABAP control access to objects for assigned users, preventing unauthorized access.

  • Authorization objects are used to control access to specific objects in ABAP programs.

  • They define which users have access to certain objects and what actions they can perform.

  • Authorization objects are assigned to roles, which are then assigned to users.

  • Examples of authorization objects include S_PROGRAM for program access and S_TABU_DIS for table maintenance access.

Add your answer

Q120. What are some accessibility standards that are a must have for a WBT?

Ans.

Some accessibility standards for a WBT include alt text for images, keyboard navigation, and clear language.

  • Provide alt text for images to assist visually impaired users

  • Ensure keyboard navigation is possible for users who cannot use a mouse

  • Use clear and simple language to make content easily understandable for all users

View 1 answer

Q121. Cases where you'll build an asset or buy an asset and impact in each scenario

Ans.

Building or buying assets impact on pricing analysis

  • Building assets can lead to higher initial costs but lower long-term costs

  • Buying assets can lead to lower initial costs but higher long-term costs

  • Building assets can provide more control over the quality and customization of the asset

  • Buying assets can provide faster access to the asset and potentially better support

  • Impact on pricing analysis depends on the cost structure and expected lifespan of the asset

Add your answer

Q122. OSPF - what are neighbrship establishment stages in OSPF, what is DR/BDR, what are types of LSAs, is different between type 5 and type 7 LSA, difference between OE1 and OE2, what is virtual link with scenario

Add your answer

Q123. What is purpose of finally, final, Dispose keyword in C#?

Ans.

finally is used in exception handling, final is a keyword for classes, Dispose is used for releasing unmanaged resources.

  • finally block is used in exception handling to ensure a piece of code is always executed, whether an exception is thrown or not.

  • final keyword is used in C# to prevent inheritance or overriding of a method, class, or property.

  • Dispose method is used to release unmanaged resources like file handles or database connections to prevent memory leaks.

Add your answer

Q124. What is SOLID principle? Name or explain one of them

Ans.

SOLID is a set of five design principles in object-oriented programming. One of them is the Single Responsibility Principle (SRP).

  • SRP states that a class should have only one reason to change, meaning it should only have one job or responsibility.

  • For example, a class that handles both user authentication and database operations violates SRP. It should be split into two separate classes.

  • SRP helps in making code more maintainable, testable, and easier to understand.

Add your answer

Q125. What microsoft certifications you hold? How many are pending renewals

Ans.

I hold Microsoft certifications in Azure and SQL Server. No pending renewals.

  • Certifications in Azure and SQL Server

  • No pending renewals

Add your answer

Q126. Follow-up Question:- How do you maintain the code for Dev/QA/Production?

Ans.

Code is maintained using version control systems like Git, with separate branches for Dev, QA, and Production.

  • Use version control systems like Git to track changes and manage code.

  • Create separate branches for Dev, QA, and Production to isolate changes and prevent conflicts.

  • Implement a code review process to ensure quality and consistency across environments.

  • Automate deployment processes to easily promote code changes from one environment to another.

  • Regularly update dependenci...read more

Add your answer

Q127. OOPs concept. How do we implement/use/purpose for Encapsulation, Abstraction?

Ans.

Encapsulation is the concept of bundling data and methods that operate on the data into a single unit. Abstraction is the concept of hiding the implementation details and showing only the necessary features of an object.

  • Encapsulation helps in data hiding and prevents direct access to data from outside the class.

  • Abstraction helps in reducing complexity by hiding unnecessary details and showing only essential features.

  • Encapsulation is achieved by using access modifiers like pri...read more

Add your answer

Q128. what is the marker interface and when and where to use interface?

Ans.

Marker interface is an empty interface used to mark a class as having a particular property or behavior.

  • Marker interface has no methods or fields, it is used to provide metadata to the code.

  • It is used to indicate that a class has a certain capability or should be treated in a special way.

  • Examples of marker interfaces are Serializable, Cloneable, and Remote.

  • Interfaces are used to achieve abstraction and provide a contract for implementing classes.

  • Interfaces are used to achieve...read more

Add your answer

Q129. Did you face any challenge while creating the DevOps pipeline?

Ans.

Yes, I faced challenges while creating the DevOps pipeline.

  • One challenge was integrating multiple tools and technologies into the pipeline.

  • Another challenge was ensuring smooth communication and collaboration between different teams involved in the pipeline.

  • I also faced challenges in automating the testing and deployment processes to achieve continuous integration and continuous delivery.

  • Dealing with legacy systems and transitioning them into the new pipeline was also a chall...read more

Add your answer

Q130. Can you tell me something about Ansible work in DevOps?

Ans.

Ansible is a popular automation tool used in DevOps for configuration management, application deployment, and orchestration.

  • Ansible is agentless, meaning it does not require any software to be installed on the nodes being managed.

  • It uses YAML syntax for writing playbooks, which are used to define automation tasks.

  • Ansible can be used for tasks such as provisioning servers, deploying applications, and managing configurations.

  • It allows for easy scaling and automation of repetiti...read more

Add your answer

Q131. What is the difference b/w Continuous delivery and continuous deployment?

Ans.

Continuous delivery focuses on automating the software delivery process up to production, while continuous deployment automatically deploys every change to production.

  • Continuous delivery involves automating the software delivery process up to production, ensuring that code is always in a deployable state.

  • Continuous deployment goes a step further by automatically deploying every change that passes automated tests to production.

  • Continuous delivery allows for manual approval bef...read more

Add your answer

Q132. What do you mean by break function?

Ans.

A break function is a statement used to exit a loop or switch statement.

  • It is used to terminate a loop or switch statement before its natural end.

  • It can be used with conditions to exit a loop when a certain condition is met.

  • Examples include 'break' in Java and C++ and 'exit' in Python.

Add your answer

Q133. How will you design security for global implementation?

Ans.

Designing security for global implementation involves considering various factors and implementing a comprehensive strategy.

  • Conduct a thorough risk assessment to identify potential vulnerabilities and threats

  • Implement strong access controls and authentication mechanisms

  • Encrypt sensitive data both in transit and at rest

  • Establish a robust incident response plan

  • Regularly update and patch systems to address security vulnerabilities

  • Implement network segmentation to limit the impac...read more

View 1 answer

Q134. four pillars of oops

Ans.

Four pillars of OOPs are Abstraction, Encapsulation, Inheritance, and Polymorphism.

  • Abstraction: Hiding implementation details and showing only necessary information.

  • Encapsulation: Binding data and functions together and restricting access to them.

  • Inheritance: Acquiring properties and behavior of a parent class by a child class.

  • Polymorphism: Ability of an object to take many forms and perform different actions based on the context.

View 7 more answers

Q135. which authentication methods used to secure rest api

Ans.

Various authentication methods can be used to secure REST API, including OAuth, JWT, Basic Authentication, and API Keys.

  • OAuth is a popular authentication method that allows users to grant access to third-party applications without sharing their credentials.

  • JWT (JSON Web Tokens) is a stateless authentication mechanism that uses a token to authenticate users.

  • Basic Authentication uses a username and password to authenticate users.

  • API Keys are unique identifiers that are used to ...read more

View 1 answer

Q136. What are the benefits of application developer

Ans.

Application developers benefit from job flexibility, high demand, and competitive salaries.

  • Job flexibility allows developers to work remotely or on a flexible schedule

  • High demand for skilled developers ensures job security and opportunities for growth

  • Competitive salaries in the tech industry offer financial stability and potential for advancement

Add your answer

Q137. Explain exception handling and which ways you used to handle it.

Ans.

Exception handling is a way to handle errors and unexpected events in a program.

  • Exception handling is used to prevent a program from crashing when an error occurs.

  • It involves catching and handling exceptions using try-catch blocks.

  • Different types of exceptions can be handled differently.

  • Examples of exception handling include logging the error, displaying a user-friendly message, or retrying the operation.

  • In Java, exceptions are represented by classes and can be customized to ...read more

Add your answer

Q138. Explain the scenario & What u do with CSRF Vulnerability

Ans.

CSRF vulnerability allows attackers to perform actions on behalf of a user without their consent.

  • CSRF attacks can be prevented by implementing CSRF tokens

  • The token is generated by the server and included in the form or URL

  • When the form is submitted, the token is verified to ensure it matches the one generated by the server

  • If the token is invalid, the request is rejected

  • CSRF vulnerabilities can be exploited to perform actions such as changing passwords, making purchases, or de...read more

Add your answer

Q139. How can broken authorisation vulnerability be extended

Ans.

Broken authorization vulnerability can be extended by exploiting other vulnerabilities or by using stolen credentials.

  • Exploiting other vulnerabilities such as SQL injection or cross-site scripting to gain unauthorized access

  • Using stolen credentials to bypass authorization checks

  • Exploiting misconfigured access controls to gain elevated privileges

  • Using brute force attacks to guess valid credentials

  • Exploiting session management vulnerabilities to hijack user sessions

Add your answer

Q140. What is KPI and it's other factors

Ans.

KPI stands for Key Performance Indicator. It is a measurable value that demonstrates how effectively a company is achieving its key business objectives.

  • KPIs are used to evaluate the success of an organization or of a particular activity in which it engages.

  • They help to identify areas that require improvement and to set goals for improvement.

  • KPIs can be financial or non-financial, qualitative or quantitative, and can be used at various levels within an organization.

  • Examples of...read more

Add your answer

Q141. How would you monitor a db performance with OEM AWR report?

Ans.

Monitoring db performance using OEM AWR report

  • Access OEM console and navigate to Performance tab

  • Select AWR report option to generate a report

  • Analyze the report for key performance metrics like CPU usage, memory utilization, I/O stats

  • Identify any performance bottlenecks and take necessary actions to optimize db performance

Add your answer

Q142. What is the difference between header and exchange property of content modifier

Ans.

Header and exchange properties are used in content modifier to manipulate message headers and exchange properties respectively.

  • Header properties are used to manipulate message headers while exchange properties are used to manipulate exchange properties.

  • Header properties are specific to a message while exchange properties are specific to an exchange.

  • Header properties can be accessed using the message object while exchange properties can be accessed using the exchange object.

  • Ex...read more

Add your answer

Q143. 1. What are the main components of CAM(MSME etc)?.

Ans.

CAM (MSME etc) has components like financial assistance, technology upgradation, marketing support, and skill development.

  • Financial assistance: loans, subsidies, grants, etc.

  • Technology upgradation: modernization of machinery, equipment, etc.

  • Marketing support: promotion, branding, advertising, etc.

  • Skill development: training, workshops, seminars, etc.

  • Examples: MSME has schemes like Credit Guarantee Fund Trust for Micro and Small Enterprises, Prime Minister's Employment Generat...read more

Add your answer

Q144. Infrastructure of the application from resume, how to handle the non performing the member

Ans.

To handle non-performing team members in application infrastructure

  • Identify the root cause of non-performance

  • Provide feedback and coaching to improve performance

  • Set clear expectations and goals

  • Offer additional training or resources

  • Consider reassigning or terminating the team member if necessary

Add your answer

Q145. What type of vulnerabilities are over there?

Ans.

There are various types of vulnerabilities such as SQL injection, cross-site scripting, buffer overflow, etc.

  • SQL injection: attackers inject malicious SQL code to gain unauthorized access to the database

  • Cross-site scripting: attackers inject malicious scripts into a website to steal user data

  • Buffer overflow: attackers exploit a program's buffer to execute malicious code

  • Other types include CSRF, DoS, and privilege escalation

  • Vulnerabilities can exist in software, hardware, and ...read more

Add your answer

Q146. Is a mnc company or not?.

Ans.

The question is asking whether a company is an MNC or not.

  • MNC stands for Multinational Corporation.

  • An MNC is a company that operates in multiple countries and has a global presence.

  • They typically have subsidiaries or branches in different countries.

  • MNCs often have a diverse workforce and cater to international markets.

  • Examples of MNCs include Apple Inc., Google, and Coca-Cola.

View 2 more answers

Q147. What is Routing? Have you heard about Conventional Routing?

Ans.

Routing is the process of directing network traffic to its destination. Conventional Routing is a method of defining routes based on conventions.

  • Routing is the process of determining the path that network packets should take from the source to the destination.

  • Conventional Routing involves defining routes based on conventions or predefined rules.

  • In web development, routing refers to mapping URLs to specific controllers and actions in an application.

  • Conventional Routing in ASP....read more

Add your answer

Q148. What is Difference Between Depreciation and Amortization?

Ans.

Depreciation is the allocation of the cost of tangible assets over their useful life, while amortization is the allocation of the cost of intangible assets over their useful life.

  • Depreciation applies to tangible assets like buildings, machinery, and vehicles, while amortization applies to intangible assets like patents, copyrights, and trademarks.

  • Depreciation is usually calculated using methods like straight-line or accelerated depreciation, while amortization is typically ca...read more

View 2 more answers

Q149. Route guards and how to implement them?

Ans.

Route guards are used to control access to routes in Angular applications.

  • Route guards are used to protect routes from unauthorized access.

  • They can be used to check if a user is authenticated or has certain permissions before allowing access to a route.

  • There are three types of route guards in Angular: CanActivate, CanActivateChild, and CanLoad.

  • CanActivate is used to determine if a route can be activated.

  • CanActivateChild is used to determine if a child route can be activated.

  • C...read more

View 1 answer

Q150. How to go back my previous version in new developed smartforms by retrieving the previous version in it .

Ans.

To retrieve a previous version of a smartform in SAP ABAP, you can use the transport request system.

  • Use the transport request system to track changes and versions of smartforms.

  • Identify the transport request containing the previous version of the smartform.

  • Import the transport request to revert back to the previous version.

  • Ensure to test the smartform after reverting to the previous version.

View 1 answer

Q151. If you have worked on SuccessFactors then which are the areas of successfactors you have worked on.

Ans.

I have worked on SuccessFactors in the areas of Employee Central, Performance & Goals, and Learning.

  • Employee Central - managing employee data, organizational structure, and workflows

  • Performance & Goals - setting goals, performance reviews, and feedback

  • Learning - managing training courses and certifications

  • Example: Configured employee data fields and workflows in Employee Central

  • Example: Created performance review templates and managed goal setting in Performance & Goals

  • Exampl...read more

Add your answer

Q152. What are the different types of DDIC tables ?

Ans.

DDIC tables are used in SAP systems to store metadata and data dictionary information.

  • Transparent tables: store application data and have a one-to-one relationship with the database table

  • Pooled tables: store control data and have a one-to-many relationship with the database table

  • Cluster tables: store data from multiple tables with a one-to-many relationship

  • View tables: virtual tables that display data from other tables without storing it physically

Add your answer

Q153. When and how do we configure database connections in JDeveloper, and what are the differences between WSDLs?

Ans.

Database connections in JDeveloper are configured in the application's deployment descriptor file. WSDLs are XML-based descriptions of web services.

  • Database connections in JDeveloper are configured in the application's deployment descriptor file, typically web.xml or persistence.xml.

  • The configuration includes details such as database URL, username, password, and driver class.

  • WSDLs (Web Services Description Language) are XML-based descriptions of web services, defining the ope...read more

Add your answer

Q154. What is amortization how do you calculates

Ans.

Amortization is the process of spreading out a loan into smaller, regular payments over a period of time.

  • Calculate the periodic payment by dividing the total loan amount by the number of payments

  • Calculate the interest portion of the payment by multiplying the outstanding balance by the interest rate

  • Calculate the principal portion of the payment by subtracting the interest portion from the periodic payment

  • Repeat the process for each payment period until the loan is fully paid ...read more

View 1 answer

Q155. How do you give access to users via az portal

Ans.

To give access to users via az portal, follow these steps:

  • Log in to the Azure portal

  • Navigate to the resource you want to give access to

  • Click on the 'Access control (IAM)' tab

  • Click on the 'Add' button

  • Select the role you want to assign to the user

  • Enter the user's email address or select from the list of existing users

  • Click on the 'Save' button

Add your answer

Q156. What are different types of function module in SAP?

Ans.

There are three types of function modules in SAP: 1) Function modules with interface 2) Function modules without interface 3) Function modules as methods of a class.

  • Function modules with interface are used for external communication

  • Function modules without interface are used for internal communication

  • Function modules as methods of a class are used for object-oriented programming

  • Examples of function modules with interface are RFC_READ_TABLE and RFC_GET_SYSTEM_INFO

  • Examples of f...read more

Add your answer

Q157. What are different drivers for Forecasting and Demand sensing?

Ans.

Forecasting and demand sensing have different drivers.

  • Forecasting is driven by historical data and trends.

  • Demand sensing is driven by real-time data and market changes.

  • Forecasting is used for long-term planning and production.

  • Demand sensing is used for short-term adjustments and inventory management.

  • Forecasting is more accurate for stable markets, while demand sensing is better for volatile markets.

  • Examples of forecasting drivers include seasonality, product lifecycle, and ma...read more

Add your answer

Q158. 1. Scrum Ceremonies 2. Conflict Resolution 3. How to handle last minute changes 4. Planning techniques 5. Day to day activities as Scrum Master 6. Agile Metrics etc

Ans.

The interview covered Scrum ceremonies, conflict resolution, handling last minute changes, planning techniques, day-to-day activities as Scrum Master, and Agile metrics.

  • Scrum ceremonies include Sprint Planning, Daily Scrum, Sprint Review, and Sprint Retrospective.

  • Conflict resolution involves identifying the root cause, facilitating communication, and finding a mutually beneficial solution.

  • Handling last minute changes requires assessing the impact on the project, communicating...read more

Add your answer

Q159. What is the difference between String StringBuffer

Ans.

String is immutable, StringBuffer is mutable in Java.

  • String is immutable, meaning once created, it cannot be changed. StringBuffer is mutable, allowing for modifications.

  • StringBuffer is synchronized, making it thread-safe. String is not synchronized.

  • StringBuffer is more efficient for concatenating multiple strings due to mutability.

  • Example: String str = "Hello"; StringBuffer sb = new StringBuffer("Hello");

Add your answer

Q160. Write query to fetch all employees name from database which starts from a alphabet.

Ans.

Query to fetch employees whose names start with a specific alphabet.

  • Use SQL query with LIKE operator and wildcard character %.

  • Example: SELECT name FROM employees WHERE name LIKE 'A%';

Add your answer

Q161. How to improve performance of iOS app?

Ans.

To improve performance of iOS app, optimize code, reduce network calls, use efficient data storage, and implement caching.

  • Optimize code by identifying and fixing memory leaks, reducing unnecessary computations, and using efficient algorithms.

  • Reduce network calls by batching requests, using background fetch and push notifications, and implementing prefetching.

  • Use efficient data storage by utilizing Core Data, Realm, or SQLite for local storage, and optimizing data structures.

  • I...read more

Add your answer

Q162. In what scenarios do you find the usage of interfaces to be most appropriate?

Ans.

Interfaces are most appropriate in scenarios where multiple classes need to implement common methods or behaviors.

  • When you want to define a contract that multiple classes must adhere to

  • When you want to achieve loose coupling between classes

  • When you want to support multiple implementations of a feature

  • When you want to enable polymorphism in your code

Add your answer

Q163. What are the features of Java 8 and how are they used?

Ans.

Java 8 introduced several new features including lambda expressions, functional interfaces, streams, and default methods.

  • Lambda expressions allow you to write code in a more concise and readable way.

  • Functional interfaces are interfaces with a single abstract method, which can be implemented using lambda expressions.

  • Streams provide a way to work with sequences of elements and perform operations such as filter, map, and reduce.

  • Default methods allow interfaces to have method imp...read more

Add your answer

Q164. How I will handle issue or escalation from client

Ans.

I will listen to the client's concerns, empathize with them, and work towards finding a solution that satisfies both parties.

  • Listen actively to the client's concerns and acknowledge their feelings

  • Apologize for any inconvenience caused and assure them that their issue will be resolved

  • Work with the team to find a solution that meets the client's needs

  • Communicate the solution to the client and follow up to ensure their satisfaction

Add your answer

Q165. What are the different type of selections available in Celonis?

Add your answer

Q166. How to improve parallel processing for a function app?

Ans.

Improve parallel processing for a function app

  • Use asynchronous programming to allow multiple tasks to run concurrently

  • Consider using a distributed computing framework like Apache Spark

  • Optimize code for parallelism by breaking down tasks into smaller chunks

  • Use caching to reduce the need for repeated computations

  • Ensure that the hardware and infrastructure can support parallel processing

Add your answer

Q167. What is debit cames in and credit go out tell me explain

Ans.

Debit represents incoming funds while credit represents outgoing funds.

  • Debit is used to record an increase in assets or a decrease in liabilities or equity.

  • Credit is used to record a decrease in assets or an increase in liabilities or equity.

  • For example, when a company receives cash from a customer, it would debit cash and credit accounts receivable.

  • Conversely, when a company pays a supplier, it would credit cash and debit accounts payable.

View 1 answer

Q168. What is Pipe? What are the types? How to write custom pipe?

Ans.

A pipe is a feature in Angular that allows you to transform data in templates. There are built-in pipes and you can also create custom pipes.

  • Types of pipes include built-in pipes like DatePipe, UpperCasePipe, LowerCasePipe, etc.

  • Custom pipes can be created by using the @Pipe decorator and implementing the PipeTransform interface.

  • To write a custom pipe, first create a new TypeScript file for the pipe, define the pipe class with @Pipe decorator, implement PipeTransform interface...read more

Add your answer

Q169. How many hairs you have on your head?

Ans.

The number of hairs on a person's head varies, but on average, it is around 100,000.

  • The number of hairs on a person's head can vary depending on factors such as genetics, age, and health.

  • On average, adults have around 100,000 hairs on their head.

  • Hair loss is a common issue that can affect the number of hairs on the head.

  • Hair color and texture can also impact the appearance of hair density.

View 1 answer

Q170. How many connectors have you worked with in power Apps

Ans.

I have worked with over 20 connectors in Power Apps, including SharePoint, Outlook, and SQL Server.

  • Worked with over 20 connectors in Power Apps

  • Familiar with connectors such as SharePoint, Outlook, and SQL Server

Add your answer

Q171. What's ICSR, Susar and other things!

Ans.

ICSR is Individual Case Safety Report and SUSAR is Suspected Unexpected Serious Adverse Reaction.

  • ICSR is a report of an adverse event or reaction that occurs in an individual patient.

  • SUSAR is an adverse reaction that is both unexpected and serious.

  • Pharmacovigilance associates are responsible for collecting and analyzing ICSRs to ensure drug safety.

  • Other important terms in pharmacovigilance include ADR (adverse drug reaction), SAE (serious adverse event), and CIOMS (Council fo...read more

Add your answer

Q172. What is transient keyword?

Ans.

Transient keyword is used in Java to indicate that a variable should not be serialized.

  • Transient keyword is used with variables to exclude them from serialization process.

  • It is used to mark a variable as non-persistent.

  • Transient variables are not saved during serialization and are initialized to default value during deserialization.

  • Example: private transient int age; // age will not be serialized

View 1 answer

Q173. What are the technical chalanges which came during implementation of the project?

Ans.

The technical challenges during project implementation

  • Integration with legacy systems

  • Ensuring data security and privacy

  • Optimizing performance and scalability

  • Dealing with compatibility issues across different platforms

  • Implementing complex business logic

  • Managing dependencies and version control

Add your answer

Q174. How will you optimize the code from where you got to know what is my efficiency of my code i.e. ATC check?

Ans.

To optimize code and check efficiency, use ATC checks in SAP ABAP Hana development.

  • Use ATC (ABAP Test Cockpit) checks to analyze code quality and performance.

  • ATC checks can identify potential issues such as performance bottlenecks, security vulnerabilities, and coding standards violations.

  • Optimize code based on ATC check results to improve efficiency and maintainability.

  • Regularly run ATC checks to ensure code quality and performance standards are met.

  • Examples: Fixing ineffici...read more

Add your answer

Q175. What syntax you feel as a difference in select(7.5) statement when it comes for HANA as compared to ECC?

Ans.

In HANA, select(7.5) statement allows for specifying the number of records to be fetched at a time.

  • In HANA, you can use the addition 'UP TO n ROWS' to limit the number of records fetched.

  • In ECC, there is no such addition available in the select statement.

  • Example: SELECT * FROM table_name INTO @DATA(lt_data) UP TO 100 ROWS.

Add your answer

Q176. Were you required to perform a VLOOKUP and HOOKUP practically with a large dataset? ( asked to do it practically )

Ans.

Yes, I have experience performing VLOOKUP and HLOOKUP with large datasets.

  • Yes, I have used VLOOKUP to search for specific data in a large Excel spreadsheet.

  • I have also used HLOOKUP to search for data in rows instead of columns.

  • Practical examples include using VLOOKUP to match employee IDs with their corresponding information.

Add your answer

Q177. 2. How do you access risk in any project?

Ans.

Risk assessment involves identifying potential risks and evaluating their likelihood and impact on the project.

  • Identify potential risks and their impact on the project

  • Evaluate the likelihood of each risk occurring

  • Assess the severity of the impact of each risk

  • Develop a risk management plan to mitigate or avoid identified risks

  • Regularly review and update the risk management plan throughout the project

Add your answer

Q178. What's EDR and explain what happens after it finds a malicious file in the device?

Add your answer

Q179. What is cursor? What is REF CURSOR? Write the syntax for Before Insert row trigger What are all the DBMS_*** packages u have used? What are exceptions and how it is handled? What are Partitions and what is exch...

read more
Ans.

A cursor is a database object used to retrieve data row by row, while a REF CURSOR is a pointer to a cursor result set.

  • Cursor is used to fetch data row by row in a database query.

  • REF CURSOR is a pointer to a cursor result set, allowing it to be passed between PL/SQL programs.

  • Syntax for Before Insert row trigger: CREATE OR REPLACE TRIGGER trigger_name BEFORE INSERT ON table_name FOR EACH ROW BEGIN ... END;

  • DBMS_*** packages are built-in packages in Oracle for various functional...read more

Add your answer

Q180. How can digital initiatives help in building a resilient organization?

Ans.

Digital initiatives can enhance organizational resilience through increased agility, efficiency, and innovation.

  • Digital tools can enable remote work and collaboration, ensuring business continuity during disruptions.

  • Data analytics can provide real-time insights for informed decision-making and risk management.

  • Automation can streamline processes and reduce costs, freeing up resources for strategic investments.

  • Digital platforms can facilitate customer engagement and feedback, d...read more

Add your answer

Q181. What type of mobile application did u test?

Ans.

I have tested various types of mobile applications including social media, e-commerce, and banking apps.

  • I have tested social media apps like Facebook, Twitter, and Instagram

  • I have tested e-commerce apps like Amazon, Flipkart, and eBay

  • I have tested banking apps like Chase, Bank of America, and Wells Fargo

Add your answer

Q182. If I could use only one statement to review the overall health of a company, which statement would I use, and why? ...

Ans.

The statement that would best review the overall health of a company is the income statement.

  • The income statement provides a comprehensive overview of a company's financial performance over a specific period.

  • It shows the company's revenues, expenses, and net income, allowing for analysis of profitability.

  • By examining the income statement, one can assess the company's ability to generate profits and manage costs.

  • It also helps in evaluating the company's revenue growth, margins...read more

Add your answer

Q183. Explain the different types of Database backups and backup strategies used in your current organisation

Ans.

Different types of database backups include full, incremental, differential, and snapshot backups.

  • Full backups: Backs up the entire database

  • Incremental backups: Backs up only the data that has changed since the last backup

  • Differential backups: Backs up all changes made since the last full backup

  • Snapshot backups: Captures the state of the database at a specific point in time

  • Backup strategies may include a combination of these types to ensure data integrity and minimize downtim...read more

Add your answer

Q184. What is entry of prepaid expense?

Ans.

Prepaid expense is an accounting concept where an expense is paid in advance before it is incurred.

  • Prepaid expense is recorded as an asset on the balance sheet.

  • It is gradually recognized as an expense over time or as the benefit is received.

  • Common examples of prepaid expenses include prepaid rent, prepaid insurance, and prepaid subscriptions.

  • To record the entry of prepaid expense, debit the prepaid expense account and credit the cash or accounts payable account.

  • As the prepaid...read more

View 3 more answers

Q185. What is the treatment for bad debts received.

Ans.

Bad debts received are written off as an expense in the income statement.

  • Bad debts are uncollectible debts that are written off as an expense in the income statement.

  • The amount of bad debts is subtracted from the accounts receivable balance.

  • The entry to write off bad debts is a debit to bad debt expense and a credit to accounts receivable.

  • The write-off of bad debts reduces the company's net income and assets.

  • Example: If a company has $10,000 in accounts receivable and $500 in...read more

Add your answer

Q186. Difference between For and While loop

Ans.

For loop is used when the number of iterations is known, while loop is used when the condition is true.

  • For loop is used when the number of iterations is known beforehand.

  • While loop is used when the condition needs to be checked before each iteration.

  • For loop is more concise and easier to read for simple iterations.

  • While loop is more flexible and can handle complex conditions.

  • Example: for(int i=0; i<5; i++) { //code }

  • Example: while(condition) { //code }

Add your answer

Q187. Swap two integers without temp variable

Ans.

Use bitwise XOR operation to swap two integers without a temp variable.

  • Use XOR operation to swap two integers: a ^= b, b ^= a, a ^= b

  • Example: int a = 5, b = 10; a ^= b; b ^= a; a ^= b; // Now a = 10, b = 5

Add your answer

Q188. what is the use of container to development abap object. to display output in the screen container is used .

Ans.

Containers are used in ABAP development to display output on the screen.

  • Containers are used to hold and display UI elements in ABAP programs.

  • They can be used to display text, images, tables, and other UI components.

  • Containers can be added to screens using the SAP GUI for Windows or Web Dynpro ABAP technology.

  • Example: DATA container TYPE REF TO cl_gui_container.

  • Example: container->add( text ).

Add your answer

Q189. What is the difference between implicit and explicit enhancement?

Ans.

Implicit enhancements are modifications made to standard SAP objects without modifying the original code, while explicit enhancements involve adding custom code directly into the standard SAP objects.

  • Implicit enhancements are done using enhancement points or sections provided by SAP, allowing developers to add custom code without modifying the original object.

  • Explicit enhancements involve directly modifying the standard SAP object by adding custom code within the object itsel...read more

Add your answer

Q190. What do know about Machine Learning?

Ans.

Machine learning is a subset of artificial intelligence that involves training algorithms to make predictions or decisions based on data.

  • Machine learning algorithms can be supervised, unsupervised, or semi-supervised

  • Examples of machine learning include image recognition, natural language processing, and recommendation systems

  • Machine learning requires large amounts of data to train algorithms effectively

  • Popular machine learning frameworks include TensorFlow, Scikit-learn, and ...read more

Add your answer

Q191. What is final account and balance sheet. difference between.

Ans.

Final account and balance sheet are financial statements used to summarize a company's financial position.

  • Final account is a statement of all the accounts in a ledger, showing the balances of each account.

  • Balance sheet is a financial statement that shows a company's assets, liabilities, and equity at a specific point in time.

  • Final account is prepared before the balance sheet.

  • Balance sheet is prepared after the final account.

  • Final account is used to prepare the balance sheet.

  • B...read more

Add your answer

Q192. Cases when Singleton Design pattern fails.

Ans.

Singleton pattern fails when it violates SOLID principles or when multiple instances are required.

  • Singleton pattern can make testing difficult as it tightly couples the code

  • It can also lead to global state and make the code harder to reason about

  • If multiple instances are required, Singleton pattern cannot be used

  • In a distributed system, Singleton pattern can lead to synchronization issues

  • If the Singleton class is not thread-safe, it can lead to race conditions

  • Examples of alte...read more

Add your answer

Q193. Example- Explain STO process? How will you differentiate if a PO with document type NB is an STO.

Ans.

STO process is a Stock Transport Order process used to transfer goods between plants in different locations.

  • STO process involves creating a purchase order (PO) with document type UB.

  • The delivering plant creates a delivery document and the receiving plant creates a goods receipt document.

  • If a PO with document type NB is an STO, it means that it is not an STO but a standard PO for external procurement.

  • The document type NB is used for standard POs while UB is used for STOs.

Add your answer

Q194. Difference between Release and Build Pipeline in Azure?

Ans.

Release pipeline is for deploying code to production, build pipeline is for compiling code.

  • Release pipeline is used for deploying code to production environment after successful testing.

  • Build pipeline is used for compiling source code into executable code or artifacts.

  • Release pipeline includes stages like Dev, Test, and Prod for deployment.

  • Build pipeline includes tasks like compiling code, running tests, and packaging artifacts.

  • Example: In Azure DevOps, you can create separat...read more

Add your answer

Q195. What do you mean by defect density?

Ans.

Defect density refers to the number of defects found in a software component or system per unit of size or complexity.

  • Defect density is a metric used to measure the quality of software.

  • It is calculated by dividing the number of defects by the size or complexity of the software component or system.

  • Defect density can be used to identify areas of the software that need improvement.

  • For example, if a software component has a high defect density, it may indicate that there are issu...read more

Add your answer

Q196. What is record producer? How many ways we can call server script in client side? Few servicenow best practices we should follow. Workflow activities.

Ans.

Record producer is a feature in ServiceNow that allows users to create records in a guided manner.

  • Record producer provides a user-friendly interface for creating records with predefined templates and fields.

  • Server scripts can be called in client side using GlideAjax, g_form.getReference, and g_scratchpad.

  • Some ServiceNow best practices include using naming conventions, documenting changes, and testing in sub-production instances.

  • Workflow activities in ServiceNow include approv...read more

Add your answer

Q197. What are the steps to add a shared mailbox in the Outlook client? Why might it be difficult to uninstall an application at times?

Ans.

To add a shared mailbox in Outlook, you need to have the necessary permissions and follow specific steps. Uninstalling an application can be difficult due to dependencies and system restrictions.

  • Ensure you have the necessary permissions to access the shared mailbox

  • In Outlook, go to File > Account Settings > Account Settings

  • Select your email account and click Change

  • Click More Settings > Advanced tab > Add

  • Enter the email address of the shared mailbox and click OK

  • To uninstall an...read more

Add your answer

Q198. What will happen if the server crashes

Ans.

If the server crashes, the website or application will become unavailable until the server is restored.

  • Website or application will be inaccessible to users

  • Data may be lost if not properly backed up

  • Potential impact on business operations and revenue

  • Need to investigate the cause of the crash and implement measures to prevent future occurrences

Add your answer

Q199. What is CDS Views ? Syntax to create parameter based views? syntax to create Association. How to publish CDS views

Ans.

CDS Views are virtual database views in SAP HANA. They can be parameter-based and have associations. They are published using annotations.

  • CDS Views are virtual database views in SAP HANA

  • Syntax to create parameter-based views: @AbapCatalog.sqlViewName: 'view_name' @AccessControl.authorizationCheck: #NOT_REQUIRED define view view_name(parameter_name) as select from table_name where field_name = :parameter_name

  • Syntax to create Association: define view view_name as select from en...read more

Add your answer

Q200. What is the use of Authorization how it is helpful explain with any example? how its created? have you ever?

Ans.

Authorization in SAP ABAP Hana Developer is used to control access to specific functionalities or data within the system.

  • Authorization is helpful in ensuring that only authorized users can perform certain actions or access certain data in the system.

  • It helps in maintaining data security and preventing unauthorized access.

  • Authorizations are created using roles, profiles, and authorization objects in SAP.

  • For example, a user may be assigned a role that allows them to create purc...read more

Add your answer
1
2
3
4
5
6
7

More about working at Accenture

Top Rated Mega Company - 2024
Top Rated Company for Women - 2024
Top Rated IT/ITES Company - 2024
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Aanchal Apparels

based on 1.5k interviews
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.5
 • 346 Interview Questions
4.0
 • 199 Interview Questions
3.9
 • 157 Interview Questions
3.7
 • 139 Interview Questions
4.0
 • 137 Interview Questions
4.0
 • 136 Interview Questions
View all
Top Accenture Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter