Add office photos
Employer?
Claim Account for FREE

Accenture

3.8
based on 56.4k Reviews
Video summary
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

3500+ ZeMoSo Technologies Interview Questions and Answers

Updated 28 Feb 2025
Popular Designations

Q301. OOPs concept. How do we implement/use/purpose for Encapsulation, Abstraction?

Ans.

Encapsulation is the concept of bundling data and methods that operate on the data into a single unit. Abstraction is the concept of hiding the implementation details and showing only the necessary features of an object.

  • Encapsulation helps in data hiding and prevents direct access to data from outside the class.

  • Abstraction helps in reducing complexity by hiding unnecessary details and showing only essential features.

  • Encapsulation is achieved by using access modifiers like pri...read more

Add your answer

Q302. 5. If you have to learn new programming language ?How will you do it .

Ans.

To learn a new programming language, I would start with understanding its syntax and basic concepts, practice coding, and seek help from online resources and experienced programmers.

  • Research and understand the syntax and basic concepts of the language

  • Practice coding in the language by working on small projects

  • Seek help from online resources such as documentation, forums, and tutorials

  • Collaborate with experienced programmers who are proficient in the language

  • Attend workshops o...read more

Add your answer

Q303. What is Aggregate awareness? When we use it? Syntax of it.

Ans.

Aggregate awareness is a feature in Business Objects that allows reports to be optimized for performance by using aggregate tables.

  • Aggregate awareness is used when creating reports in Business Objects

  • It allows the report to use aggregate tables instead of detailed tables for improved performance

  • Syntax: AGGR_AWARE(, ,

    )

  • Example: AGGR_AWARE(Product, Sum(Sales), Sales_Fact_Table)

Add your answer

Q304. what is the marker interface and when and where to use interface?

Ans.

Marker interface is an empty interface used to mark a class as having a particular property or behavior.

  • Marker interface has no methods or fields, it is used to provide metadata to the code.

  • It is used to indicate that a class has a certain capability or should be treated in a special way.

  • Examples of marker interfaces are Serializable, Cloneable, and Remote.

  • Interfaces are used to achieve abstraction and provide a contract for implementing classes.

  • Interfaces are used to achieve...read more

Add your answer
Discover ZeMoSo Technologies interview dos and don'ts from real experiences

Q305. What's your understanding about documentation and background verification

Ans.

Documentation and background verification are important processes in HR to ensure accuracy and reliability of information.

  • Documentation involves collecting, organizing, and maintaining records related to employees, such as resumes, contracts, and performance evaluations.

  • Background verification is the process of verifying the accuracy of information provided by job applicants, such as employment history, educational qualifications, and criminal records.

  • Documentation helps in m...read more

View 2 more answers

Q306. Every project at ABC has 3 phases – Diagnostics, Design and Implementation. You are a consultant to an oil and gas company so take me through each of the three phases in a structured manner

Ans.

The three phases of a project at ABC - Diagnostics, Design, and Implementation

  • Diagnostics phase involves gathering information and analyzing the current state of the oil and gas company

  • Design phase focuses on developing a plan or strategy to address the identified issues or goals

  • Implementation phase involves executing the plan, monitoring progress, and making necessary adjustments

  • Example: In the diagnostics phase, consultants may conduct interviews, collect data, and analyze ...read more

Add your answer
Are these interview questions helpful?

Q307. which technology did you use your in project? ----java

Ans.

I used Java in my project.

  • Java was the primary programming language used in the project.

  • I utilized Java libraries and frameworks to develop the software.

  • Java provided a robust and scalable platform for the project requirements.

  • I implemented various Java design patterns to enhance code reusability and maintainability.

  • Java's object-oriented nature facilitated modular development and easy integration with other technologies.

View 1 answer

Q308. What is pandas in python, Numpy, list and set their differences

Ans.

pandas is a Python library for data manipulation and analysis. Numpy is a library for numerical operations. List and set are data structures in Python.

  • pandas is used for data manipulation, analysis, and cleaning tasks.

  • Numpy provides support for large, multi-dimensional arrays and matrices.

  • Lists are ordered collections of items, while sets are unordered collections of unique items.

  • Lists are mutable, while sets are immutable.

  • Lists allow duplicate elements, while sets do not.

  • Lis...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q309. Did you face any challenge while creating the DevOps pipeline?

Ans.

Yes, I faced challenges while creating the DevOps pipeline.

  • One challenge was integrating multiple tools and technologies into the pipeline.

  • Another challenge was ensuring smooth communication and collaboration between different teams involved in the pipeline.

  • I also faced challenges in automating the testing and deployment processes to achieve continuous integration and continuous delivery.

  • Dealing with legacy systems and transitioning them into the new pipeline was also a chall...read more

Add your answer

Q310. Can you tell me something about Ansible work in DevOps?

Ans.

Ansible is a popular automation tool used in DevOps for configuration management, application deployment, and orchestration.

  • Ansible is agentless, meaning it does not require any software to be installed on the nodes being managed.

  • It uses YAML syntax for writing playbooks, which are used to define automation tasks.

  • Ansible can be used for tasks such as provisioning servers, deploying applications, and managing configurations.

  • It allows for easy scaling and automation of repetiti...read more

Add your answer

Q311. What is the difference b/w Continuous delivery and continuous deployment?

Ans.

Continuous delivery focuses on automating the software delivery process up to production, while continuous deployment automatically deploys every change to production.

  • Continuous delivery involves automating the software delivery process up to production, ensuring that code is always in a deployable state.

  • Continuous deployment goes a step further by automatically deploying every change that passes automated tests to production.

  • Continuous delivery allows for manual approval bef...read more

Add your answer

Q312. Difference between if and where?

Ans.

if is a conditional statement used to execute code based on a condition. where is used to filter data in a query.

  • if is used in programming languages to execute code based on a condition

  • where is used in SQL to filter data in a query

  • if can have multiple conditions and can be nested

  • where can only have one condition per query

View 1 answer

Q313. What is net profit? What is gross profit? What is deprication?

Ans.

Net profit is the profit after all expenses are deducted. Gross profit is the profit before expenses are deducted. Depreciation is the decrease in value of an asset over time.

  • Net profit is calculated by subtracting all expenses from total revenue.

  • Gross profit is calculated by subtracting the cost of goods sold from total revenue.

  • Depreciation is a non-cash expense that reflects the decrease in value of an asset over time.

  • Depreciation is usually calculated using the straight-li...read more

Add your answer

Q314. How much do you know about agile methodologies and why people are preferring this over any other framework?

Ans.

Agile methodologies are preferred for their flexibility, collaboration, and ability to adapt to changing requirements.

  • Agile methodologies prioritize individuals and interactions over processes and tools.

  • They emphasize working software over comprehensive documentation.

  • Agile allows for frequent iterations and feedback, leading to quicker delivery of value to customers.

  • Scrum, Kanban, and Extreme Programming (XP) are popular agile frameworks.

  • Agile promotes continuous improvement ...read more

Add your answer

Q315. Why is Nokia doing badly? What are the strategic mistakes it has made?

Ans.

Nokia is doing badly due to strategic mistakes.

  • Nokia failed to adapt to the rise of smartphones and the shift towards touchscreen technology.

  • The company's partnership with Microsoft and the decision to use Windows Phone as its primary operating system was a strategic mistake.

  • Nokia underestimated the competition from Apple and Android-based manufacturers.

  • The company's slow response to changing consumer preferences and lack of innovation in its product offerings contributed to ...read more

Add your answer

Q316. Why did you use a CLI library in your project?

Ans.

CLI library was used for user interaction and ease of use.

  • CLI library provided a simple and intuitive way for users to interact with the project.

  • It allowed for easy input and output handling.

  • Examples include argparse in Python and Commander.js in Node.js.

  • It also made it easier to automate tasks through scripts.

  • Overall, it improved the user experience and made the project more accessible.

Add your answer

Q317. How to find the second largest number in an array using javascript?

Ans.

To find the second largest number in an array using JavaScript, sort the array in descending order and return the element at index 1.

  • Sort the array in descending order using the sort() method.

  • Access the element at index 1 to get the second largest number.

Add your answer

Q318. which authentication methods used to secure rest api

Ans.

Various authentication methods can be used to secure REST API, including OAuth, JWT, Basic Authentication, and API Keys.

  • OAuth is a popular authentication method that allows users to grant access to third-party applications without sharing their credentials.

  • JWT (JSON Web Tokens) is a stateless authentication mechanism that uses a token to authenticate users.

  • Basic Authentication uses a username and password to authenticate users.

  • API Keys are unique identifiers that are used to ...read more

View 1 answer

Q319. Explain the scenario & What u do with CSRF Vulnerability

Ans.

CSRF vulnerability allows attackers to perform actions on behalf of a user without their consent.

  • CSRF attacks can be prevented by implementing CSRF tokens

  • The token is generated by the server and included in the form or URL

  • When the form is submitted, the token is verified to ensure it matches the one generated by the server

  • If the token is invalid, the request is rejected

  • CSRF vulnerabilities can be exploited to perform actions such as changing passwords, making purchases, or de...read more

Add your answer

Q320. How can broken authorisation vulnerability be extended

Ans.

Broken authorization vulnerability can be extended by exploiting other vulnerabilities or by using stolen credentials.

  • Exploiting other vulnerabilities such as SQL injection or cross-site scripting to gain unauthorized access

  • Using stolen credentials to bypass authorization checks

  • Exploiting misconfigured access controls to gain elevated privileges

  • Using brute force attacks to guess valid credentials

  • Exploiting session management vulnerabilities to hijack user sessions

Add your answer

Q321. How to increase the number of bank accounts of a public sector bank?

Ans.

Increasing the number of bank accounts of a public sector bank

  • Offer attractive interest rates and benefits to customers

  • Expand the bank's reach by opening new branches in untapped areas

  • Partner with businesses and offer exclusive banking services to their employees

  • Launch targeted marketing campaigns to attract new customers

  • Provide excellent customer service to retain existing customers

Add your answer

Q322. How to commoditize the perfume being sold at the Jaipur city palace & used by the royal family?

Ans.

Commoditizing perfume sold at Jaipur City Palace used by the royal family.

  • Create a brand around the perfume with a unique name and packaging

  • Offer different sizes and variations of the perfume

  • Sell the perfume online and in retail stores

  • Collaborate with popular influencers to promote the perfume

  • Offer limited edition versions of the perfume

  • Create a loyalty program for customers

  • Offer discounts and promotions to attract customers

  • Use social media to create buzz and awareness about ...read more

Add your answer

Q323. What are the various ways in which you’ll reduce inventory pile up?

Ans.

To reduce inventory pile up, various strategies can be implemented.

  • Implementing a just-in-time (JIT) inventory management system

  • Analyzing demand patterns and adjusting inventory levels accordingly

  • Improving forecasting accuracy to avoid overstocking

  • Establishing effective communication channels with suppliers to ensure timely deliveries

  • Implementing inventory control measures like ABC analysis and safety stock calculations

  • Regularly reviewing and optimizing inventory replenishmen...read more

Add your answer

Q324. How will you search for content in a pool of resources

Ans.

I would use a combination of search filters, keywords, and metadata to efficiently search for relevant content.

  • Identify the specific pool of resources and their organization

  • Use search filters such as date, author, and type of content

  • Utilize relevant keywords and synonyms

  • Take advantage of metadata such as tags and descriptions

  • Consider the context and purpose of the search

  • Refine the search based on initial results

View 1 answer

Q325. find the speed of the train ,if a train 142 m long passes a pole in 6 seconds

Ans.

Find the speed of a train if it passes a pole in 6 seconds and is 142m long.

  • Use the formula: speed = distance/time

  • Convert meters to kilometers if necessary

  • Calculate the speed in km/h or m/s

Add your answer

Q326. How would you monitor a db performance with OEM AWR report?

Ans.

Monitoring db performance using OEM AWR report

  • Access OEM console and navigate to Performance tab

  • Select AWR report option to generate a report

  • Analyze the report for key performance metrics like CPU usage, memory utilization, I/O stats

  • Identify any performance bottlenecks and take necessary actions to optimize db performance

Add your answer

Q327. Small jumbelled words arranged into meaningful sentences

Ans.

The question is asking for small jumbled words to be arranged into meaningful sentences.

  • Read each word carefully and try to identify any patterns or connections between them.

  • Look for common parts of speech such as nouns, verbs, and adjectives.

  • Try rearranging the words in different orders to see if any make sense.

  • Use context clues to help determine the meaning of each word.

  • Practice with similar exercises to improve your skills.

Add your answer

Q328. What type of vulnerabilities are over there?

Ans.

There are various types of vulnerabilities such as SQL injection, cross-site scripting, buffer overflow, etc.

  • SQL injection: attackers inject malicious SQL code to gain unauthorized access to the database

  • Cross-site scripting: attackers inject malicious scripts into a website to steal user data

  • Buffer overflow: attackers exploit a program's buffer to execute malicious code

  • Other types include CSRF, DoS, and privilege escalation

  • Vulnerabilities can exist in software, hardware, and ...read more

Add your answer

Q329. Is a mnc company or not?.

Ans.

The question is asking whether a company is an MNC or not.

  • MNC stands for Multinational Corporation.

  • An MNC is a company that operates in multiple countries and has a global presence.

  • They typically have subsidiaries or branches in different countries.

  • MNCs often have a diverse workforce and cater to international markets.

  • Examples of MNCs include Apple Inc., Google, and Coca-Cola.

View 2 more answers

Q330. What is Routing? Have you heard about Conventional Routing?

Ans.

Routing is the process of directing network traffic to its destination. Conventional Routing is a method of defining routes based on conventions.

  • Routing is the process of determining the path that network packets should take from the source to the destination.

  • Conventional Routing involves defining routes based on conventions or predefined rules.

  • In web development, routing refers to mapping URLs to specific controllers and actions in an application.

  • Conventional Routing in ASP....read more

Add your answer

Q331. Route guards and how to implement them?

Ans.

Route guards are used to control access to routes in Angular applications.

  • Route guards are used to protect routes from unauthorized access.

  • They can be used to check if a user is authenticated or has certain permissions before allowing access to a route.

  • There are three types of route guards in Angular: CanActivate, CanActivateChild, and CanLoad.

  • CanActivate is used to determine if a route can be activated.

  • CanActivateChild is used to determine if a child route can be activated.

  • C...read more

View 1 answer

Q332. How to go back my previous version in new developed smartforms by retrieving the previous version in it .

Ans.

To retrieve a previous version of a smartform in SAP ABAP, you can use the transport request system.

  • Use the transport request system to track changes and versions of smartforms.

  • Identify the transport request containing the previous version of the smartform.

  • Import the transport request to revert back to the previous version.

  • Ensure to test the smartform after reverting to the previous version.

View 1 answer

Q333. How you distributed the modules among your team mates?

Ans.

I distributed modules based on team members' expertise and workload.

  • Analyzed team members' skills and experience

  • Assigned modules based on their strengths

  • Considered workload and availability

  • Communicated and collaborated with team members

  • Reviewed progress and made adjustments as needed

Add your answer

Q334. Case study: If you purchased goods on credit. What will be the period to pay that amount?

Ans.

The period to pay for goods purchased on credit depends on the terms agreed upon with the supplier.

  • The payment period for goods purchased on credit is typically outlined in the credit terms agreed upon with the supplier.

  • Common payment periods for goods purchased on credit include 30 days, 60 days, or 90 days.

  • Late payments may incur penalties or interest charges, so it is important to adhere to the agreed-upon payment terms.

Add your answer

Q335. 1.In clustering how do you analyze clusters have stabilized and the number of clusters, the respective formulas. 2. Regression related questions. 3. Precison recall definition 4. how do you utilize cross entrop...

read more
Ans.

The interview questions cover topics like clustering analysis, regression, precision-recall, cross entropy, and total sum of squares vs error sum of squares.

  • 1. Use silhouette score or elbow method to determine if clusters have stabilized and the optimal number of clusters.

  • 2. Regression questions may involve explaining the relationship between independent and dependent variables, interpreting coefficients, and assessing model fit.

  • 3. Precision-recall is a measure of a model's a...read more

Add your answer

Q336. What is the branching strategy and release strategy

Ans.

Branching strategy is a way to manage code changes and release strategy is a plan to deploy code changes to production.

  • Branching strategy defines how code changes are managed and merged into the main codebase.

  • Release strategy defines how code changes are deployed to production.

  • Common branching strategies include Gitflow, Trunk-based development, and Feature branching.

  • Common release strategies include Continuous Deployment, Blue-Green Deployment, and Canary Deployment.

Add your answer

Q337. What is normalization in the database?

Ans.

Normalization is the process of organizing data in a database to eliminate redundancy and improve data integrity.

  • Normalization helps in reducing data redundancy by breaking down a large table into smaller, more manageable tables.

  • It ensures that each piece of data is stored in only one place, reducing the chances of inconsistencies.

  • Normalization follows a set of rules called normal forms, such as First Normal Form (1NF), Second Normal Form (2NF), etc.

  • Each normal form has speci...read more

View 2 more answers

Q338. When and how do we configure database connections in JDeveloper, and what are the differences between WSDLs?

Ans.

Database connections in JDeveloper are configured in the application's deployment descriptor file. WSDLs are XML-based descriptions of web services.

  • Database connections in JDeveloper are configured in the application's deployment descriptor file, typically web.xml or persistence.xml.

  • The configuration includes details such as database URL, username, password, and driver class.

  • WSDLs (Web Services Description Language) are XML-based descriptions of web services, defining the ope...read more

Add your answer

Q339. How do you give access to users via az portal

Ans.

To give access to users via az portal, follow these steps:

  • Log in to the Azure portal

  • Navigate to the resource you want to give access to

  • Click on the 'Access control (IAM)' tab

  • Click on the 'Add' button

  • Select the role you want to assign to the user

  • Enter the user's email address or select from the list of existing users

  • Click on the 'Save' button

Add your answer

Q340. What are different drivers for Forecasting and Demand sensing?

Ans.

Forecasting and demand sensing have different drivers.

  • Forecasting is driven by historical data and trends.

  • Demand sensing is driven by real-time data and market changes.

  • Forecasting is used for long-term planning and production.

  • Demand sensing is used for short-term adjustments and inventory management.

  • Forecasting is more accurate for stable markets, while demand sensing is better for volatile markets.

  • Examples of forecasting drivers include seasonality, product lifecycle, and ma...read more

Add your answer

Q341. Create a password application, which can show how strong or weak the password is, using if-else.

Add your answer

Q342. 1. Scrum Ceremonies 2. Conflict Resolution 3. How to handle last minute changes 4. Planning techniques 5. Day to day activities as Scrum Master 6. Agile Metrics etc

Ans.

The interview covered Scrum ceremonies, conflict resolution, handling last minute changes, planning techniques, day-to-day activities as Scrum Master, and Agile metrics.

  • Scrum ceremonies include Sprint Planning, Daily Scrum, Sprint Review, and Sprint Retrospective.

  • Conflict resolution involves identifying the root cause, facilitating communication, and finding a mutually beneficial solution.

  • Handling last minute changes requires assessing the impact on the project, communicating...read more

Add your answer

Q343. What are basic requirements during setting the environment for testing?

Ans.

Basic requirements for setting up testing environment

  • Identify the scope of testing

  • Select appropriate hardware and software

  • Ensure availability of necessary tools and resources

  • Create test data and test cases

  • Establish communication channels for reporting issues

  • Define testing timelines and milestones

Add your answer

Q344. What is Delete and Truncate Command

Ans.

Delete command is used to remove specific rows from a table, while truncate command is used to remove all rows from a table.

  • Delete command is a DML (Data Manipulation Language) statement.

  • Delete command can be used with a WHERE clause to specify the rows to be deleted.

  • Truncate command is a DDL (Data Definition Language) statement.

  • Truncate command removes all rows from a table, but keeps the table structure intact.

  • Truncate command is faster than delete command as it does not ge...read more

View 1 answer

Q345. How I will handle issue or escalation from client

Ans.

I will listen to the client's concerns, empathize with them, and work towards finding a solution that satisfies both parties.

  • Listen actively to the client's concerns and acknowledge their feelings

  • Apologize for any inconvenience caused and assure them that their issue will be resolved

  • Work with the team to find a solution that meets the client's needs

  • Communicate the solution to the client and follow up to ensure their satisfaction

Add your answer

Q346. What are the different type of selections available in Celonis?

Add your answer

Q347. What is the difference between Deferred Revenue and Unbilled?

Ans.

Deferred Revenue is revenue received in advance while Unbilled is revenue yet to be invoiced.

  • Deferred Revenue is recognized as revenue over time or upon completion of the service/product

  • Unbilled revenue is recognized as revenue when the invoice is issued

  • Deferred Revenue is a liability on the balance sheet while Unbilled revenue is an asset

  • Examples of Deferred Revenue include subscription fees, maintenance contracts, and retainers

  • Examples of Unbilled revenue include work in pr...read more

Add your answer

Q348. What is debit cames in and credit go out tell me explain

Ans.

Debit represents incoming funds while credit represents outgoing funds.

  • Debit is used to record an increase in assets or a decrease in liabilities or equity.

  • Credit is used to record a decrease in assets or an increase in liabilities or equity.

  • For example, when a company receives cash from a customer, it would debit cash and credit accounts receivable.

  • Conversely, when a company pays a supplier, it would credit cash and debit accounts payable.

View 1 answer

Q349. Methods of migrating Hive metdatastore to unity catalog in Databricks ?

Ans.

Use Databricks provided tools like databricks-connect and databricks-cli to migrate Hive metadata to Unity catalog.

  • Use databricks-connect to connect to the Databricks workspace from your local development environment.

  • Use databricks-cli to export the Hive metadata from the existing Hive metastore.

  • Create a new Unity catalog in Databricks and import the exported metadata using databricks-cli.

  • Validate the migration by checking the tables and databases in the Unity catalog.

Add your answer

Q350. 1.What is different types of testing? 2.what is oops? 3.what is abstraction?

Ans.

Different types of testing include unit testing, integration testing, system testing, and acceptance testing.

  • Unit testing focuses on testing individual components or units of code.

  • Integration testing verifies the interaction between different components.

  • System testing ensures the entire system works as expected.

  • Acceptance testing validates if the system meets the user's requirements.

  • OOPs stands for Object-Oriented Programming.

  • Abstraction is a concept in OOP that focuses on hi...read more

View 1 answer

Q351. What is difference between es5 and es6? What all new features that es6 and es5+ have?

Ans.

ES6 is the newer version of JavaScript with added features like arrow functions, classes, and let/const declarations.

  • ES5 is the fifth version of ECMAScript, released in 2009.

  • ES6, also known as ECMAScript 2015, introduced new features like arrow functions, classes, let/const declarations, template literals, and spread/rest operators.

  • ES6 also added features like default parameter values, destructuring assignments, and promises.

  • ES6 modules allow for better organization and encap...read more

Add your answer

Q352. How many hairs you have on your head?

Ans.

The number of hairs on a person's head varies, but on average, it is around 100,000.

  • The number of hairs on a person's head can vary depending on factors such as genetics, age, and health.

  • On average, adults have around 100,000 hairs on their head.

  • Hair loss is a common issue that can affect the number of hairs on the head.

  • Hair color and texture can also impact the appearance of hair density.

View 1 answer

Q353. How many connectors have you worked with in power Apps

Ans.

I have worked with over 20 connectors in Power Apps, including SharePoint, Outlook, and SQL Server.

  • Worked with over 20 connectors in Power Apps

  • Familiar with connectors such as SharePoint, Outlook, and SQL Server

Add your answer

Q354. What is MultiThreading?

Ans.

Multithreading is the ability of a CPU to execute multiple threads concurrently.

  • Multithreading allows for better utilization of CPU resources.

  • It can improve application performance by allowing multiple tasks to run simultaneously.

  • Multithreading can be implemented in various programming languages such as Java, C++, and Python.

  • Examples of multithreaded applications include web servers, video games, and media players.

Add your answer

Q355. if there if git merge conflict then how can you handle it?

Ans.

Handle git merge conflicts by resolving conflicts manually or using tools like git mergetool.

  • Manually resolve conflicts by editing the conflicting files in text editor

  • Use 'git status' to see which files have conflicts

  • Use 'git diff' to see the conflicting changes

  • Use 'git mergetool' to open a visual merge tool to resolve conflicts

  • After resolving conflicts, add the changes and commit the merge

Add your answer

Q356. What's ICSR, Susar and other things!

Ans.

ICSR is Individual Case Safety Report and SUSAR is Suspected Unexpected Serious Adverse Reaction.

  • ICSR is a report of an adverse event or reaction that occurs in an individual patient.

  • SUSAR is an adverse reaction that is both unexpected and serious.

  • Pharmacovigilance associates are responsible for collecting and analyzing ICSRs to ensure drug safety.

  • Other important terms in pharmacovigilance include ADR (adverse drug reaction), SAE (serious adverse event), and CIOMS (Council fo...read more

Add your answer

Q357. What is accounting & why accounting is important

Ans.

Accounting is the process of recording, classifying, and summarizing financial transactions to provide information for decision-making.

  • Accounting helps businesses keep track of their financial transactions and performance.

  • It provides financial information to stakeholders such as investors, creditors, and management.

  • Accounting helps in making informed decisions about investments, budgeting, and forecasting.

  • It is important for tax compliance and financial reporting.

  • Examples of ...read more

View 2 more answers

Q358. What did you do in relation to financial products?

Ans.

I have experience in managing and selling various financial products.

  • Managed a portfolio of mutual funds and provided investment advice to clients

  • Sold insurance policies and explained the benefits and coverage to customers

  • Assisted in the underwriting process for loans and evaluated creditworthiness of applicants

  • Developed financial models to analyze the performance of different investment options

  • Collaborated with other departments to create marketing materials for financial pr...read more

Add your answer

Q359. 1. What is transport management 2. Debugging 3. ALV reports 4. Smartforms 5. Module pool programming

Ans.

Questions related to SAP ABAP development including transport management, debugging, ALV reports, Smartforms, and module pool programming.

  • Transport management involves moving changes made in development to testing and production environments.

  • Debugging is the process of identifying and fixing errors in code.

  • ALV reports are used to display data in a tabular format with various formatting options.

  • Smartforms are used to create and customize forms for printing.

  • Module pool programm...read more

Add your answer

Q360. What are the technical chalanges which came during implementation of the project?

Ans.

The technical challenges during project implementation

  • Integration with legacy systems

  • Ensuring data security and privacy

  • Optimizing performance and scalability

  • Dealing with compatibility issues across different platforms

  • Implementing complex business logic

  • Managing dependencies and version control

Add your answer

Q361. How will you optimize the code from where you got to know what is my efficiency of my code i.e. ATC check?

Ans.

To optimize code and check efficiency, use ATC checks in SAP ABAP Hana development.

  • Use ATC (ABAP Test Cockpit) checks to analyze code quality and performance.

  • ATC checks can identify potential issues such as performance bottlenecks, security vulnerabilities, and coding standards violations.

  • Optimize code based on ATC check results to improve efficiency and maintainability.

  • Regularly run ATC checks to ensure code quality and performance standards are met.

  • Examples: Fixing ineffici...read more

Add your answer

Q362. What syntax you feel as a difference in select(7.5) statement when it comes for HANA as compared to ECC?

Ans.

In HANA, select(7.5) statement allows for specifying the number of records to be fetched at a time.

  • In HANA, you can use the addition 'UP TO n ROWS' to limit the number of records fetched.

  • In ECC, there is no such addition available in the select statement.

  • Example: SELECT * FROM table_name INTO @DATA(lt_data) UP TO 100 ROWS.

Add your answer

Q363. What is the difference between padding and margin?

Ans.

Padding is the space inside an element, while margin is the space outside an element.

  • Padding is used to create space between an element's content and its border.

  • Margin is used to create space between an element's border and the adjacent elements.

  • Padding is affected by the background color of the element, while margin is not.

  • Padding can be set individually for each side of an element (top, right, bottom, left), while margin can be set as a shorthand for all sides or individual...read more

View 1 answer

Q364. How did you solve the coding questions in round 2? Can you share the logic behind it?

Add your answer

Q365. 1. Explain the high architecture level architecture of your latest project. 2. Explain your role in the project. 3. Write code to add list view in backoffice. 4. What is mode = append 5. Can we use if else in i...

read more
Ans.

I have experience working on a high-level architecture project, with a focus on SAP Hybris development.

  • I was responsible for designing and implementing the backend functionality of the project.

  • I worked on adding a list view in the backoffice using code.

  • Mode = append is used in impex to add new data without overwriting existing data.

  • Yes, if else statements can be used in impex to conditionally import data.

Add your answer

Q366. Were you required to perform a VLOOKUP and HOOKUP practically with a large dataset? ( asked to do it practically )

Ans.

Yes, I have experience performing VLOOKUP and HLOOKUP with large datasets.

  • Yes, I have used VLOOKUP to search for specific data in a large Excel spreadsheet.

  • I have also used HLOOKUP to search for data in rows instead of columns.

  • Practical examples include using VLOOKUP to match employee IDs with their corresponding information.

Add your answer

Q367. What are different types of collection and why do we get concurrent modification exception?

Ans.

Different types of collection and reasons for concurrent modification exception.

  • Types of collections: List, Set, Map, Queue, Stack

  • Concurrent modification exception occurs when a collection is modified while iterating over it

  • Solution: use Iterator or synchronized collection

Add your answer

Q368. 1. What are the golden rules of accounting ? 2.If insurance premium is paid for 1 st January for entire year to 31st December and books get closed on 31st march? What will be accounting treatment? 3. What are b...

read more
Ans.

The golden rules of accounting are basic principles that guide the process of recording financial transactions.

  • The golden rules of accounting include the principles of Debit the receiver, Credit the giver; Debit what comes in, Credit what goes out; and Debit expenses and losses, Credit income and gains.

  • For the insurance premium paid for the entire year on 1st January, the accounting treatment on 31st March would involve recognizing only 3 months of the premium as an expense i...read more

Add your answer

Q369. What's EDR and explain what happens after it finds a malicious file in the device?

Add your answer

Q370. What type of mobile application did u test?

Ans.

I have tested various types of mobile applications including social media, e-commerce, and banking apps.

  • I have tested social media apps like Facebook, Twitter, and Instagram

  • I have tested e-commerce apps like Amazon, Flipkart, and eBay

  • I have tested banking apps like Chase, Bank of America, and Wells Fargo

Add your answer

Q371. Difference between decision tree and decision table

Ans.

Decision tree is a graphical representation of decisions and their possible consequences, while decision table is a tabular representation of decisions and their corresponding actions.

  • Decision tree is a visual representation of a decision-making process, where each branch represents a possible decision and its outcome.

  • Decision table is a table that lists all possible combinations of conditions and actions, making it easier to determine the appropriate action for a given set o...read more

View 1 answer

Q372. Explain me what is Encapsulation

Ans.

Encapsulation is the process of hiding implementation details and restricting access to an object's properties and methods.

  • Encapsulation helps in achieving data abstraction and security.

  • It allows for better control over the data and prevents unauthorized access.

  • Encapsulation is implemented using access modifiers such as public, private, and protected.

  • For example, a bank account class may have private variables for account number and balance, and public methods for deposit and...read more

View 1 answer

Q373. How can digital initiatives help in building a resilient organization?

Ans.

Digital initiatives can enhance organizational resilience through increased agility, efficiency, and innovation.

  • Digital tools can enable remote work and collaboration, ensuring business continuity during disruptions.

  • Data analytics can provide real-time insights for informed decision-making and risk management.

  • Automation can streamline processes and reduce costs, freeing up resources for strategic investments.

  • Digital platforms can facilitate customer engagement and feedback, d...read more

Add your answer

Q374. what we have to do if we want to arrange the icons on the desktop

Add your answer

Q375. If I could use only one statement to review the overall health of a company, which statement would I use, and why? ...

Ans.

The statement that would best review the overall health of a company is the income statement.

  • The income statement provides a comprehensive overview of a company's financial performance over a specific period.

  • It shows the company's revenues, expenses, and net income, allowing for analysis of profitability.

  • By examining the income statement, one can assess the company's ability to generate profits and manage costs.

  • It also helps in evaluating the company's revenue growth, margins...read more

Add your answer

Q376. Explain the different types of Database backups and backup strategies used in your current organisation

Ans.

Different types of database backups include full, incremental, differential, and snapshot backups.

  • Full backups: Backs up the entire database

  • Incremental backups: Backs up only the data that has changed since the last backup

  • Differential backups: Backs up all changes made since the last full backup

  • Snapshot backups: Captures the state of the database at a specific point in time

  • Backup strategies may include a combination of these types to ensure data integrity and minimize downtim...read more

Add your answer

Q377. What is the treatment for bad debts received.

Ans.

Bad debts received are written off as an expense in the income statement.

  • Bad debts are uncollectible debts that are written off as an expense in the income statement.

  • The amount of bad debts is subtracted from the accounts receivable balance.

  • The entry to write off bad debts is a debit to bad debt expense and a credit to accounts receivable.

  • The write-off of bad debts reduces the company's net income and assets.

  • Example: If a company has $10,000 in accounts receivable and $500 in...read more

Add your answer

Q378. What is entry of prepaid expense?

Ans.

Prepaid expense is an accounting concept where an expense is paid in advance before it is incurred.

  • Prepaid expense is recorded as an asset on the balance sheet.

  • It is gradually recognized as an expense over time or as the benefit is received.

  • Common examples of prepaid expenses include prepaid rent, prepaid insurance, and prepaid subscriptions.

  • To record the entry of prepaid expense, debit the prepaid expense account and credit the cash or accounts payable account.

  • As the prepaid...read more

View 3 more answers

Q379. what is the use of container to development abap object. to display output in the screen container is used .

Ans.

Containers are used in ABAP development to display output on the screen.

  • Containers are used to hold and display UI elements in ABAP programs.

  • They can be used to display text, images, tables, and other UI components.

  • Containers can be added to screens using the SAP GUI for Windows or Web Dynpro ABAP technology.

  • Example: DATA container TYPE REF TO cl_gui_container.

  • Example: container->add( text ).

Add your answer

Q380. What are the golden rules and general journal entries for the purchase of goods?

Ans.

Golden rules and general journal entries for purchasing goods

  • Debit the Purchases account for the cost of goods purchased

  • Credit the Accounts Payable account for the amount owed to the supplier

  • If cash is paid, credit the Cash account

  • If a discount is received, credit the Discount Received account

  • If taxes are paid, credit the Taxes Paid account

Add your answer

Q381. How to decide when to use custom workflow and plugin?

Ans.

Custom workflows and plugins are used based on specific requirements and functionality needed.

  • Custom workflows are useful when there is a need for a specific business process that is not available in the out-of-the-box workflows.

  • Plugins are useful when there is a need for custom business logic that cannot be achieved through configuration or workflows.

  • Consider the complexity of the requirement and the impact on performance before deciding to use custom workflows or plugins.

  • Ex...read more

Add your answer

Q382. You have Product { ProductName, Price...} which collection do you use to sort this, and how do you sort

Ans.

I would use a List collection and sort by Price in ascending order.

  • Use List collection for dynamic size and easy sorting

  • Sort by Price in ascending order using built-in sorting methods

  • Example: List products = new List(); products.Sort((x, y) => x.Price.CompareTo(y.Price));

Add your answer

Q383. What do you understand from Micromax’s recent advertising campaigns? Why has it cast Hugh Jackman?

Ans.

Micromax's recent advertising campaigns feature Hugh Jackman to enhance brand image and appeal to a global audience.

  • Micromax's recent advertising campaigns aim to strengthen the brand's image and increase its global appeal.

  • The inclusion of Hugh Jackman, a globally recognized actor, helps to create a strong association with the brand.

  • Hugh Jackman's popularity and charisma can attract a wider audience and generate interest in Micromax products.

  • The use of a celebrity endorsement...read more

Add your answer

Q384. 5.what is difference between isnull and is blank? 6.what is the primitive data types? 7.what is the difference between workflow and trigger?

Ans.

Difference between isnull and is blank, primitive data types, and difference between workflow and trigger.

  • isnull is used to check if a value is null or not, while is blank is used to check if a value is empty or consists only of whitespace characters.

  • Primitive data types are basic data types provided by a programming language, such as integers, floats, booleans, and characters.

  • A workflow is a series of steps or actions that are executed in a specific order to automate a busin...read more

Add your answer

Q385. What is polymorphism? And real time examples

Ans.

Polymorphism is the ability of an object to take on many forms. It allows objects of different classes to be treated as if they were of the same class.

  • Polymorphism is achieved through method overriding and method overloading.

  • Real-time examples include function overloading, operator overloading, and inheritance.

  • In function overloading, multiple functions can have the same name but different parameters.

  • In operator overloading, operators like +, -, * can be overloaded to work wi...read more

Add your answer

Q386. What are the indexes you used ? Diff between bitmap and btree index

Ans.

Indexes used include bitmap and btree. Bitmap index is used for low cardinality columns, while btree index is used for high cardinality columns.

  • Bitmap index is efficient for low cardinality columns with few distinct values

  • Btree index is efficient for high cardinality columns with many distinct values

  • Bitmap index uses bitmaps to represent the presence of a value in a column

  • Btree index is a balanced tree structure that allows for fast searching and retrieval of data

Add your answer

Q387. Explain about Unit Testing and how it is useful?

Ans.

Unit testing is a software testing method where individual units or components of a software are tested in isolation.

  • Helps in identifying bugs early in the development cycle

  • Ensures that each unit of code is working as expected

  • Facilitates code refactoring and maintenance

  • Improves code quality and reduces the risk of regression

  • Automated unit tests can be run frequently to catch issues quickly

Add your answer

Q388. Case Study on Digital Marketing Strategy for a European Fashion Brand to enter Indian market with only online store - Objective, Targeting, Channel Strategy, Budget Allocation, Campaign Impact Measurement

Ans.

Digital marketing strategy for a European fashion brand to enter Indian market with only online store.

  • Objective: Increase brand awareness and drive online sales.

  • Targeting: Young, fashion-conscious Indian consumers through social media and influencer marketing.

  • Channel Strategy: Focus on social media platforms like Instagram and Facebook, as well as fashion blogs and online fashion magazines.

  • Budget Allocation: Majority of budget allocated towards social media advertising and in...read more

Add your answer

Q389. What is final account and balance sheet. difference between.

Ans.

Final account and balance sheet are financial statements used to summarize a company's financial position.

  • Final account is a statement of all the accounts in a ledger, showing the balances of each account.

  • Balance sheet is a financial statement that shows a company's assets, liabilities, and equity at a specific point in time.

  • Final account is prepared before the balance sheet.

  • Balance sheet is prepared after the final account.

  • Final account is used to prepare the balance sheet.

  • B...read more

Add your answer

Q390. What is depreciation

Ans.

Depreciation is the decrease in value of an asset over time due to wear and tear, obsolescence or other factors.

  • Depreciation is a non-cash expense that reduces the value of an asset on the balance sheet.

  • It is calculated based on the useful life of the asset and the method of depreciation chosen.

  • Examples of assets that can be depreciated include buildings, vehicles, machinery, and equipment.

  • Depreciation can be straight-line, accelerated, or units of production method.

  • Depreciat...read more

View 9 more answers

Q391. Example- Explain STO process? How will you differentiate if a PO with document type NB is an STO.

Ans.

STO process is a Stock Transport Order process used to transfer goods between plants in different locations.

  • STO process involves creating a purchase order (PO) with document type UB.

  • The delivering plant creates a delivery document and the receiving plant creates a goods receipt document.

  • If a PO with document type NB is an STO, it means that it is not an STO but a standard PO for external procurement.

  • The document type NB is used for standard POs while UB is used for STOs.

Add your answer

Q392. Reverse string, find second highest number , string vs string buffer , hash map vs hash set, instance & local variable, primitive and non primitive data type, overloading vs overriding , explain framework

Ans.

Interview questions for QA Engineer

  • Reverse a string using StringBuilder or StringBuffer

  • Find second highest number by sorting the array and accessing the second last element

  • String is immutable while StringBuffer is mutable

  • HashMap stores key-value pairs while HashSet stores only keys

  • Instance variables are declared inside a class while local variables are declared inside a method

  • Primitive data types are int, float, double, etc. while non-primitive data types are arrays, classes,...read more

Add your answer

Q393. How would you measure the stack space without using the task manager, when an application is running on a computer? Write an algorithm if possible!!!

Ans.

To measure stack space without task manager, monitor memory usage and track stack pointer changes.

  • Monitor memory usage of the application using system calls or profiling tools.

  • Track changes in the stack pointer register to estimate stack space usage.

  • Calculate the difference between initial and final stack pointer values to determine stack space used.

  • Use tools like Valgrind, GDB, or custom memory profiling libraries for detailed analysis.

Add your answer

Q394. What is Trade lifecycle

Ans.

Trade lifecycle refers to the various stages involved in the execution and settlement of a trade.

  • Trade initiation: The process begins with the decision to buy or sell a financial instrument.

  • Order placement: The trade is then placed with a broker or through an electronic trading platform.

  • Trade execution: The order is matched with a counterparty and the trade is executed.

  • Confirmation: Both parties receive trade confirmations detailing the trade details.

  • Clearing and settlement: ...read more

View 2 more answers

Q395. What is record producer? How many ways we can call server script in client side? Few servicenow best practices we should follow. Workflow activities.

Ans.

Record producer is a feature in ServiceNow that allows users to create records in a guided manner.

  • Record producer provides a user-friendly interface for creating records with predefined templates and fields.

  • Server scripts can be called in client side using GlideAjax, g_form.getReference, and g_scratchpad.

  • Some ServiceNow best practices include using naming conventions, documenting changes, and testing in sub-production instances.

  • Workflow activities in ServiceNow include approv...read more

Add your answer

Q396. What are the steps to add a shared mailbox in the Outlook client? Why might it be difficult to uninstall an application at times?

Ans.

To add a shared mailbox in Outlook, you need to have the necessary permissions and follow specific steps. Uninstalling an application can be difficult due to dependencies and system restrictions.

  • Ensure you have the necessary permissions to access the shared mailbox

  • In Outlook, go to File > Account Settings > Account Settings

  • Select your email account and click Change

  • Click More Settings > Advanced tab > Add

  • Enter the email address of the shared mailbox and click OK

  • To uninstall an...read more

Add your answer

Q397. What is CDS Views ? Syntax to create parameter based views? syntax to create Association. How to publish CDS views

Ans.

CDS Views are virtual database views in SAP HANA. They can be parameter-based and have associations. They are published using annotations.

  • CDS Views are virtual database views in SAP HANA

  • Syntax to create parameter-based views: @AbapCatalog.sqlViewName: 'view_name' @AccessControl.authorizationCheck: #NOT_REQUIRED define view view_name(parameter_name) as select from table_name where field_name = :parameter_name

  • Syntax to create Association: define view view_name as select from en...read more

Add your answer

Q398. What is the use of Authorization how it is helpful explain with any example? how its created? have you ever?

Ans.

Authorization in SAP ABAP Hana Developer is used to control access to specific functionalities or data within the system.

  • Authorization is helpful in ensuring that only authorized users can perform certain actions or access certain data in the system.

  • It helps in maintaining data security and preventing unauthorized access.

  • Authorizations are created using roles, profiles, and authorization objects in SAP.

  • For example, a user may be assigned a role that allows them to create purc...read more

Add your answer

Q399. what is quable apex in salesforce

Ans.

Quable Apex is a tool that allows developers to write and test Apex code in a more efficient and organized way.

  • Quable Apex provides a structured way to organize Apex code

  • It allows developers to write and test code in a more efficient manner

  • Quable Apex includes features such as code versioning and deployment management

  • It can be integrated with Salesforce's development tools such as the Force.com IDE

Add your answer

Q400. What is directive and what are the different types of directive? What is Angular life cycle hook? Difference between ngOnChanges(), ngOnInit() and ngDoCheck()? What is closure? What is Hoisting? what is Lazy lo...

read more
Ans.

Directives in Angular are markers on a DOM element that tell Angular to attach a specific behavior to that element or transform the DOM element and its children.

  • Types of directives: Structural directives (ngIf, ngFor) and Attribute directives (ngModel, ngStyle)

  • Angular life cycle hook: A set of methods that Angular calls on a directive/component at defined points in time

  • Difference between ngOnChanges(), ngOnInit() and ngDoCheck(): ngOnChanges() is called when an input binding ...read more

Add your answer
1
2
3
4
5
6
7

More about working at Accenture

Top Rated Mega Company - 2024
Top Rated Company for Women - 2024
Top Rated IT/ITES Company - 2024
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at ZeMoSo Technologies

based on 6.8k interviews
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.8
 • 3k Interview Questions
4.1
 • 278 Interview Questions
4.1
 • 272 Interview Questions
4.2
 • 223 Interview Questions
3.9
 • 173 Interview Questions
3.8
 • 137 Interview Questions
View all
Top Accenture Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter