Accenture
3500+ ZeMoSo Technologies Interview Questions and Answers
Q301. OOPs concept. How do we implement/use/purpose for Encapsulation, Abstraction?
Encapsulation is the concept of bundling data and methods that operate on the data into a single unit. Abstraction is the concept of hiding the implementation details and showing only the necessary features of an object.
Encapsulation helps in data hiding and prevents direct access to data from outside the class.
Abstraction helps in reducing complexity by hiding unnecessary details and showing only essential features.
Encapsulation is achieved by using access modifiers like pri...read more
Q302. 5. If you have to learn new programming language ?How will you do it .
To learn a new programming language, I would start with understanding its syntax and basic concepts, practice coding, and seek help from online resources and experienced programmers.
Research and understand the syntax and basic concepts of the language
Practice coding in the language by working on small projects
Seek help from online resources such as documentation, forums, and tutorials
Collaborate with experienced programmers who are proficient in the language
Attend workshops o...read more
Q303. What is Aggregate awareness? When we use it? Syntax of it.
Aggregate awareness is a feature in Business Objects that allows reports to be optimized for performance by using aggregate tables.
Aggregate awareness is used when creating reports in Business Objects
It allows the report to use aggregate tables instead of detailed tables for improved performance
Syntax: AGGR_AWARE(
), , Example: AGGR_AWARE(Product, Sum(Sales), Sales_Fact_Table)
Q304. what is the marker interface and when and where to use interface?
Marker interface is an empty interface used to mark a class as having a particular property or behavior.
Marker interface has no methods or fields, it is used to provide metadata to the code.
It is used to indicate that a class has a certain capability or should be treated in a special way.
Examples of marker interfaces are Serializable, Cloneable, and Remote.
Interfaces are used to achieve abstraction and provide a contract for implementing classes.
Interfaces are used to achieve...read more
Q305. What's your understanding about documentation and background verification
Documentation and background verification are important processes in HR to ensure accuracy and reliability of information.
Documentation involves collecting, organizing, and maintaining records related to employees, such as resumes, contracts, and performance evaluations.
Background verification is the process of verifying the accuracy of information provided by job applicants, such as employment history, educational qualifications, and criminal records.
Documentation helps in m...read more
Q306. Every project at ABC has 3 phases – Diagnostics, Design and Implementation. You are a consultant to an oil and gas company so take me through each of the three phases in a structured manner
The three phases of a project at ABC - Diagnostics, Design, and Implementation
Diagnostics phase involves gathering information and analyzing the current state of the oil and gas company
Design phase focuses on developing a plan or strategy to address the identified issues or goals
Implementation phase involves executing the plan, monitoring progress, and making necessary adjustments
Example: In the diagnostics phase, consultants may conduct interviews, collect data, and analyze ...read more
Q307. which technology did you use your in project? ----java
I used Java in my project.
Java was the primary programming language used in the project.
I utilized Java libraries and frameworks to develop the software.
Java provided a robust and scalable platform for the project requirements.
I implemented various Java design patterns to enhance code reusability and maintainability.
Java's object-oriented nature facilitated modular development and easy integration with other technologies.
Q308. What is pandas in python, Numpy, list and set their differences
pandas is a Python library for data manipulation and analysis. Numpy is a library for numerical operations. List and set are data structures in Python.
pandas is used for data manipulation, analysis, and cleaning tasks.
Numpy provides support for large, multi-dimensional arrays and matrices.
Lists are ordered collections of items, while sets are unordered collections of unique items.
Lists are mutable, while sets are immutable.
Lists allow duplicate elements, while sets do not.
Lis...read more
Q309. Did you face any challenge while creating the DevOps pipeline?
Yes, I faced challenges while creating the DevOps pipeline.
One challenge was integrating multiple tools and technologies into the pipeline.
Another challenge was ensuring smooth communication and collaboration between different teams involved in the pipeline.
I also faced challenges in automating the testing and deployment processes to achieve continuous integration and continuous delivery.
Dealing with legacy systems and transitioning them into the new pipeline was also a chall...read more
Q310. Can you tell me something about Ansible work in DevOps?
Ansible is a popular automation tool used in DevOps for configuration management, application deployment, and orchestration.
Ansible is agentless, meaning it does not require any software to be installed on the nodes being managed.
It uses YAML syntax for writing playbooks, which are used to define automation tasks.
Ansible can be used for tasks such as provisioning servers, deploying applications, and managing configurations.
It allows for easy scaling and automation of repetiti...read more
Q311. What is the difference b/w Continuous delivery and continuous deployment?
Continuous delivery focuses on automating the software delivery process up to production, while continuous deployment automatically deploys every change to production.
Continuous delivery involves automating the software delivery process up to production, ensuring that code is always in a deployable state.
Continuous deployment goes a step further by automatically deploying every change that passes automated tests to production.
Continuous delivery allows for manual approval bef...read more
Q312. Difference between if and where?
if is a conditional statement used to execute code based on a condition. where is used to filter data in a query.
if is used in programming languages to execute code based on a condition
where is used in SQL to filter data in a query
if can have multiple conditions and can be nested
where can only have one condition per query
Q313. What is net profit? What is gross profit? What is deprication?
Net profit is the profit after all expenses are deducted. Gross profit is the profit before expenses are deducted. Depreciation is the decrease in value of an asset over time.
Net profit is calculated by subtracting all expenses from total revenue.
Gross profit is calculated by subtracting the cost of goods sold from total revenue.
Depreciation is a non-cash expense that reflects the decrease in value of an asset over time.
Depreciation is usually calculated using the straight-li...read more
Q314. How much do you know about agile methodologies and why people are preferring this over any other framework?
Agile methodologies are preferred for their flexibility, collaboration, and ability to adapt to changing requirements.
Agile methodologies prioritize individuals and interactions over processes and tools.
They emphasize working software over comprehensive documentation.
Agile allows for frequent iterations and feedback, leading to quicker delivery of value to customers.
Scrum, Kanban, and Extreme Programming (XP) are popular agile frameworks.
Agile promotes continuous improvement ...read more
Q315. Why is Nokia doing badly? What are the strategic mistakes it has made?
Nokia is doing badly due to strategic mistakes.
Nokia failed to adapt to the rise of smartphones and the shift towards touchscreen technology.
The company's partnership with Microsoft and the decision to use Windows Phone as its primary operating system was a strategic mistake.
Nokia underestimated the competition from Apple and Android-based manufacturers.
The company's slow response to changing consumer preferences and lack of innovation in its product offerings contributed to ...read more
Q316. Why did you use a CLI library in your project?
CLI library was used for user interaction and ease of use.
CLI library provided a simple and intuitive way for users to interact with the project.
It allowed for easy input and output handling.
Examples include argparse in Python and Commander.js in Node.js.
It also made it easier to automate tasks through scripts.
Overall, it improved the user experience and made the project more accessible.
Q317. How to find the second largest number in an array using javascript?
To find the second largest number in an array using JavaScript, sort the array in descending order and return the element at index 1.
Sort the array in descending order using the sort() method.
Access the element at index 1 to get the second largest number.
Q318. which authentication methods used to secure rest api
Various authentication methods can be used to secure REST API, including OAuth, JWT, Basic Authentication, and API Keys.
OAuth is a popular authentication method that allows users to grant access to third-party applications without sharing their credentials.
JWT (JSON Web Tokens) is a stateless authentication mechanism that uses a token to authenticate users.
Basic Authentication uses a username and password to authenticate users.
API Keys are unique identifiers that are used to ...read more
Q319. Explain the scenario & What u do with CSRF Vulnerability
CSRF vulnerability allows attackers to perform actions on behalf of a user without their consent.
CSRF attacks can be prevented by implementing CSRF tokens
The token is generated by the server and included in the form or URL
When the form is submitted, the token is verified to ensure it matches the one generated by the server
If the token is invalid, the request is rejected
CSRF vulnerabilities can be exploited to perform actions such as changing passwords, making purchases, or de...read more
Q320. How can broken authorisation vulnerability be extended
Broken authorization vulnerability can be extended by exploiting other vulnerabilities or by using stolen credentials.
Exploiting other vulnerabilities such as SQL injection or cross-site scripting to gain unauthorized access
Using stolen credentials to bypass authorization checks
Exploiting misconfigured access controls to gain elevated privileges
Using brute force attacks to guess valid credentials
Exploiting session management vulnerabilities to hijack user sessions
Q321. How to increase the number of bank accounts of a public sector bank?
Increasing the number of bank accounts of a public sector bank
Offer attractive interest rates and benefits to customers
Expand the bank's reach by opening new branches in untapped areas
Partner with businesses and offer exclusive banking services to their employees
Launch targeted marketing campaigns to attract new customers
Provide excellent customer service to retain existing customers
Q322. How to commoditize the perfume being sold at the Jaipur city palace & used by the royal family?
Commoditizing perfume sold at Jaipur City Palace used by the royal family.
Create a brand around the perfume with a unique name and packaging
Offer different sizes and variations of the perfume
Sell the perfume online and in retail stores
Collaborate with popular influencers to promote the perfume
Offer limited edition versions of the perfume
Create a loyalty program for customers
Offer discounts and promotions to attract customers
Use social media to create buzz and awareness about ...read more
Q323. What are the various ways in which you’ll reduce inventory pile up?
To reduce inventory pile up, various strategies can be implemented.
Implementing a just-in-time (JIT) inventory management system
Analyzing demand patterns and adjusting inventory levels accordingly
Improving forecasting accuracy to avoid overstocking
Establishing effective communication channels with suppliers to ensure timely deliveries
Implementing inventory control measures like ABC analysis and safety stock calculations
Regularly reviewing and optimizing inventory replenishmen...read more
Q324. How will you search for content in a pool of resources
I would use a combination of search filters, keywords, and metadata to efficiently search for relevant content.
Identify the specific pool of resources and their organization
Use search filters such as date, author, and type of content
Utilize relevant keywords and synonyms
Take advantage of metadata such as tags and descriptions
Consider the context and purpose of the search
Refine the search based on initial results
Q325. find the speed of the train ,if a train 142 m long passes a pole in 6 seconds
Find the speed of a train if it passes a pole in 6 seconds and is 142m long.
Use the formula: speed = distance/time
Convert meters to kilometers if necessary
Calculate the speed in km/h or m/s
Q326. How would you monitor a db performance with OEM AWR report?
Monitoring db performance using OEM AWR report
Access OEM console and navigate to Performance tab
Select AWR report option to generate a report
Analyze the report for key performance metrics like CPU usage, memory utilization, I/O stats
Identify any performance bottlenecks and take necessary actions to optimize db performance
Q327. Small jumbelled words arranged into meaningful sentences
The question is asking for small jumbled words to be arranged into meaningful sentences.
Read each word carefully and try to identify any patterns or connections between them.
Look for common parts of speech such as nouns, verbs, and adjectives.
Try rearranging the words in different orders to see if any make sense.
Use context clues to help determine the meaning of each word.
Practice with similar exercises to improve your skills.
Q328. What type of vulnerabilities are over there?
There are various types of vulnerabilities such as SQL injection, cross-site scripting, buffer overflow, etc.
SQL injection: attackers inject malicious SQL code to gain unauthorized access to the database
Cross-site scripting: attackers inject malicious scripts into a website to steal user data
Buffer overflow: attackers exploit a program's buffer to execute malicious code
Other types include CSRF, DoS, and privilege escalation
Vulnerabilities can exist in software, hardware, and ...read more
Q329. Is a mnc company or not?.
The question is asking whether a company is an MNC or not.
MNC stands for Multinational Corporation.
An MNC is a company that operates in multiple countries and has a global presence.
They typically have subsidiaries or branches in different countries.
MNCs often have a diverse workforce and cater to international markets.
Examples of MNCs include Apple Inc., Google, and Coca-Cola.
Q330. What is Routing? Have you heard about Conventional Routing?
Routing is the process of directing network traffic to its destination. Conventional Routing is a method of defining routes based on conventions.
Routing is the process of determining the path that network packets should take from the source to the destination.
Conventional Routing involves defining routes based on conventions or predefined rules.
In web development, routing refers to mapping URLs to specific controllers and actions in an application.
Conventional Routing in ASP....read more
Q331. Route guards and how to implement them?
Route guards are used to control access to routes in Angular applications.
Route guards are used to protect routes from unauthorized access.
They can be used to check if a user is authenticated or has certain permissions before allowing access to a route.
There are three types of route guards in Angular: CanActivate, CanActivateChild, and CanLoad.
CanActivate is used to determine if a route can be activated.
CanActivateChild is used to determine if a child route can be activated.
C...read more
Q332. How to go back my previous version in new developed smartforms by retrieving the previous version in it .
To retrieve a previous version of a smartform in SAP ABAP, you can use the transport request system.
Use the transport request system to track changes and versions of smartforms.
Identify the transport request containing the previous version of the smartform.
Import the transport request to revert back to the previous version.
Ensure to test the smartform after reverting to the previous version.
Q333. How you distributed the modules among your team mates?
I distributed modules based on team members' expertise and workload.
Analyzed team members' skills and experience
Assigned modules based on their strengths
Considered workload and availability
Communicated and collaborated with team members
Reviewed progress and made adjustments as needed
Q334. Case study: If you purchased goods on credit. What will be the period to pay that amount?
The period to pay for goods purchased on credit depends on the terms agreed upon with the supplier.
The payment period for goods purchased on credit is typically outlined in the credit terms agreed upon with the supplier.
Common payment periods for goods purchased on credit include 30 days, 60 days, or 90 days.
Late payments may incur penalties or interest charges, so it is important to adhere to the agreed-upon payment terms.
Q335. 1.In clustering how do you analyze clusters have stabilized and the number of clusters, the respective formulas. 2. Regression related questions. 3. Precison recall definition 4. how do you utilize cross entrop...
read moreThe interview questions cover topics like clustering analysis, regression, precision-recall, cross entropy, and total sum of squares vs error sum of squares.
1. Use silhouette score or elbow method to determine if clusters have stabilized and the optimal number of clusters.
2. Regression questions may involve explaining the relationship between independent and dependent variables, interpreting coefficients, and assessing model fit.
3. Precision-recall is a measure of a model's a...read more
Q336. What is the branching strategy and release strategy
Branching strategy is a way to manage code changes and release strategy is a plan to deploy code changes to production.
Branching strategy defines how code changes are managed and merged into the main codebase.
Release strategy defines how code changes are deployed to production.
Common branching strategies include Gitflow, Trunk-based development, and Feature branching.
Common release strategies include Continuous Deployment, Blue-Green Deployment, and Canary Deployment.
Q337. What is normalization in the database?
Normalization is the process of organizing data in a database to eliminate redundancy and improve data integrity.
Normalization helps in reducing data redundancy by breaking down a large table into smaller, more manageable tables.
It ensures that each piece of data is stored in only one place, reducing the chances of inconsistencies.
Normalization follows a set of rules called normal forms, such as First Normal Form (1NF), Second Normal Form (2NF), etc.
Each normal form has speci...read more
Q338. When and how do we configure database connections in JDeveloper, and what are the differences between WSDLs?
Database connections in JDeveloper are configured in the application's deployment descriptor file. WSDLs are XML-based descriptions of web services.
Database connections in JDeveloper are configured in the application's deployment descriptor file, typically web.xml or persistence.xml.
The configuration includes details such as database URL, username, password, and driver class.
WSDLs (Web Services Description Language) are XML-based descriptions of web services, defining the ope...read more
Q339. How do you give access to users via az portal
To give access to users via az portal, follow these steps:
Log in to the Azure portal
Navigate to the resource you want to give access to
Click on the 'Access control (IAM)' tab
Click on the 'Add' button
Select the role you want to assign to the user
Enter the user's email address or select from the list of existing users
Click on the 'Save' button
Q340. What are different drivers for Forecasting and Demand sensing?
Forecasting and demand sensing have different drivers.
Forecasting is driven by historical data and trends.
Demand sensing is driven by real-time data and market changes.
Forecasting is used for long-term planning and production.
Demand sensing is used for short-term adjustments and inventory management.
Forecasting is more accurate for stable markets, while demand sensing is better for volatile markets.
Examples of forecasting drivers include seasonality, product lifecycle, and ma...read more
Q341. Create a password application, which can show how strong or weak the password is, using if-else.
Q342. 1. Scrum Ceremonies 2. Conflict Resolution 3. How to handle last minute changes 4. Planning techniques 5. Day to day activities as Scrum Master 6. Agile Metrics etc
The interview covered Scrum ceremonies, conflict resolution, handling last minute changes, planning techniques, day-to-day activities as Scrum Master, and Agile metrics.
Scrum ceremonies include Sprint Planning, Daily Scrum, Sprint Review, and Sprint Retrospective.
Conflict resolution involves identifying the root cause, facilitating communication, and finding a mutually beneficial solution.
Handling last minute changes requires assessing the impact on the project, communicating...read more
Q343. What are basic requirements during setting the environment for testing?
Basic requirements for setting up testing environment
Identify the scope of testing
Select appropriate hardware and software
Ensure availability of necessary tools and resources
Create test data and test cases
Establish communication channels for reporting issues
Define testing timelines and milestones
Q344. What is Delete and Truncate Command
Delete command is used to remove specific rows from a table, while truncate command is used to remove all rows from a table.
Delete command is a DML (Data Manipulation Language) statement.
Delete command can be used with a WHERE clause to specify the rows to be deleted.
Truncate command is a DDL (Data Definition Language) statement.
Truncate command removes all rows from a table, but keeps the table structure intact.
Truncate command is faster than delete command as it does not ge...read more
Q345. How I will handle issue or escalation from client
I will listen to the client's concerns, empathize with them, and work towards finding a solution that satisfies both parties.
Listen actively to the client's concerns and acknowledge their feelings
Apologize for any inconvenience caused and assure them that their issue will be resolved
Work with the team to find a solution that meets the client's needs
Communicate the solution to the client and follow up to ensure their satisfaction
Q346. What are the different type of selections available in Celonis?
Q347. What is the difference between Deferred Revenue and Unbilled?
Deferred Revenue is revenue received in advance while Unbilled is revenue yet to be invoiced.
Deferred Revenue is recognized as revenue over time or upon completion of the service/product
Unbilled revenue is recognized as revenue when the invoice is issued
Deferred Revenue is a liability on the balance sheet while Unbilled revenue is an asset
Examples of Deferred Revenue include subscription fees, maintenance contracts, and retainers
Examples of Unbilled revenue include work in pr...read more
Q348. What is debit cames in and credit go out tell me explain
Debit represents incoming funds while credit represents outgoing funds.
Debit is used to record an increase in assets or a decrease in liabilities or equity.
Credit is used to record a decrease in assets or an increase in liabilities or equity.
For example, when a company receives cash from a customer, it would debit cash and credit accounts receivable.
Conversely, when a company pays a supplier, it would credit cash and debit accounts payable.
Q349. Methods of migrating Hive metdatastore to unity catalog in Databricks ?
Use Databricks provided tools like databricks-connect and databricks-cli to migrate Hive metadata to Unity catalog.
Use databricks-connect to connect to the Databricks workspace from your local development environment.
Use databricks-cli to export the Hive metadata from the existing Hive metastore.
Create a new Unity catalog in Databricks and import the exported metadata using databricks-cli.
Validate the migration by checking the tables and databases in the Unity catalog.
Q350. 1.What is different types of testing? 2.what is oops? 3.what is abstraction?
Different types of testing include unit testing, integration testing, system testing, and acceptance testing.
Unit testing focuses on testing individual components or units of code.
Integration testing verifies the interaction between different components.
System testing ensures the entire system works as expected.
Acceptance testing validates if the system meets the user's requirements.
OOPs stands for Object-Oriented Programming.
Abstraction is a concept in OOP that focuses on hi...read more
Q351. What is difference between es5 and es6? What all new features that es6 and es5+ have?
ES6 is the newer version of JavaScript with added features like arrow functions, classes, and let/const declarations.
ES5 is the fifth version of ECMAScript, released in 2009.
ES6, also known as ECMAScript 2015, introduced new features like arrow functions, classes, let/const declarations, template literals, and spread/rest operators.
ES6 also added features like default parameter values, destructuring assignments, and promises.
ES6 modules allow for better organization and encap...read more
Q352. How many hairs you have on your head?
The number of hairs on a person's head varies, but on average, it is around 100,000.
The number of hairs on a person's head can vary depending on factors such as genetics, age, and health.
On average, adults have around 100,000 hairs on their head.
Hair loss is a common issue that can affect the number of hairs on the head.
Hair color and texture can also impact the appearance of hair density.
Q353. How many connectors have you worked with in power Apps
I have worked with over 20 connectors in Power Apps, including SharePoint, Outlook, and SQL Server.
Worked with over 20 connectors in Power Apps
Familiar with connectors such as SharePoint, Outlook, and SQL Server
Q354. What is MultiThreading?
Multithreading is the ability of a CPU to execute multiple threads concurrently.
Multithreading allows for better utilization of CPU resources.
It can improve application performance by allowing multiple tasks to run simultaneously.
Multithreading can be implemented in various programming languages such as Java, C++, and Python.
Examples of multithreaded applications include web servers, video games, and media players.
Q355. if there if git merge conflict then how can you handle it?
Handle git merge conflicts by resolving conflicts manually or using tools like git mergetool.
Manually resolve conflicts by editing the conflicting files in text editor
Use 'git status' to see which files have conflicts
Use 'git diff' to see the conflicting changes
Use 'git mergetool' to open a visual merge tool to resolve conflicts
After resolving conflicts, add the changes and commit the merge
Q356. What's ICSR, Susar and other things!
ICSR is Individual Case Safety Report and SUSAR is Suspected Unexpected Serious Adverse Reaction.
ICSR is a report of an adverse event or reaction that occurs in an individual patient.
SUSAR is an adverse reaction that is both unexpected and serious.
Pharmacovigilance associates are responsible for collecting and analyzing ICSRs to ensure drug safety.
Other important terms in pharmacovigilance include ADR (adverse drug reaction), SAE (serious adverse event), and CIOMS (Council fo...read more
Q357. What is accounting & why accounting is important
Accounting is the process of recording, classifying, and summarizing financial transactions to provide information for decision-making.
Accounting helps businesses keep track of their financial transactions and performance.
It provides financial information to stakeholders such as investors, creditors, and management.
Accounting helps in making informed decisions about investments, budgeting, and forecasting.
It is important for tax compliance and financial reporting.
Examples of ...read more
Q358. What did you do in relation to financial products?
I have experience in managing and selling various financial products.
Managed a portfolio of mutual funds and provided investment advice to clients
Sold insurance policies and explained the benefits and coverage to customers
Assisted in the underwriting process for loans and evaluated creditworthiness of applicants
Developed financial models to analyze the performance of different investment options
Collaborated with other departments to create marketing materials for financial pr...read more
Q359. 1. What is transport management 2. Debugging 3. ALV reports 4. Smartforms 5. Module pool programming
Questions related to SAP ABAP development including transport management, debugging, ALV reports, Smartforms, and module pool programming.
Transport management involves moving changes made in development to testing and production environments.
Debugging is the process of identifying and fixing errors in code.
ALV reports are used to display data in a tabular format with various formatting options.
Smartforms are used to create and customize forms for printing.
Module pool programm...read more
Q360. What are the technical chalanges which came during implementation of the project?
The technical challenges during project implementation
Integration with legacy systems
Ensuring data security and privacy
Optimizing performance and scalability
Dealing with compatibility issues across different platforms
Implementing complex business logic
Managing dependencies and version control
Q361. How will you optimize the code from where you got to know what is my efficiency of my code i.e. ATC check?
To optimize code and check efficiency, use ATC checks in SAP ABAP Hana development.
Use ATC (ABAP Test Cockpit) checks to analyze code quality and performance.
ATC checks can identify potential issues such as performance bottlenecks, security vulnerabilities, and coding standards violations.
Optimize code based on ATC check results to improve efficiency and maintainability.
Regularly run ATC checks to ensure code quality and performance standards are met.
Examples: Fixing ineffici...read more
Q362. What syntax you feel as a difference in select(7.5) statement when it comes for HANA as compared to ECC?
In HANA, select(7.5) statement allows for specifying the number of records to be fetched at a time.
In HANA, you can use the addition 'UP TO n ROWS' to limit the number of records fetched.
In ECC, there is no such addition available in the select statement.
Example: SELECT * FROM table_name INTO @DATA(lt_data) UP TO 100 ROWS.
Q363. What is the difference between padding and margin?
Padding is the space inside an element, while margin is the space outside an element.
Padding is used to create space between an element's content and its border.
Margin is used to create space between an element's border and the adjacent elements.
Padding is affected by the background color of the element, while margin is not.
Padding can be set individually for each side of an element (top, right, bottom, left), while margin can be set as a shorthand for all sides or individual...read more
Q364. How did you solve the coding questions in round 2? Can you share the logic behind it?
Q365. 1. Explain the high architecture level architecture of your latest project. 2. Explain your role in the project. 3. Write code to add list view in backoffice. 4. What is mode = append 5. Can we use if else in i...
read moreI have experience working on a high-level architecture project, with a focus on SAP Hybris development.
I was responsible for designing and implementing the backend functionality of the project.
I worked on adding a list view in the backoffice using code.
Mode = append is used in impex to add new data without overwriting existing data.
Yes, if else statements can be used in impex to conditionally import data.
Q366. Were you required to perform a VLOOKUP and HOOKUP practically with a large dataset? ( asked to do it practically )
Yes, I have experience performing VLOOKUP and HLOOKUP with large datasets.
Yes, I have used VLOOKUP to search for specific data in a large Excel spreadsheet.
I have also used HLOOKUP to search for data in rows instead of columns.
Practical examples include using VLOOKUP to match employee IDs with their corresponding information.
Q367. What are different types of collection and why do we get concurrent modification exception?
Different types of collection and reasons for concurrent modification exception.
Types of collections: List, Set, Map, Queue, Stack
Concurrent modification exception occurs when a collection is modified while iterating over it
Solution: use Iterator or synchronized collection
Q368. 1. What are the golden rules of accounting ? 2.If insurance premium is paid for 1 st January for entire year to 31st December and books get closed on 31st march? What will be accounting treatment? 3. What are b...
read moreThe golden rules of accounting are basic principles that guide the process of recording financial transactions.
The golden rules of accounting include the principles of Debit the receiver, Credit the giver; Debit what comes in, Credit what goes out; and Debit expenses and losses, Credit income and gains.
For the insurance premium paid for the entire year on 1st January, the accounting treatment on 31st March would involve recognizing only 3 months of the premium as an expense i...read more
Q369. What's EDR and explain what happens after it finds a malicious file in the device?
Q370. What type of mobile application did u test?
I have tested various types of mobile applications including social media, e-commerce, and banking apps.
I have tested social media apps like Facebook, Twitter, and Instagram
I have tested e-commerce apps like Amazon, Flipkart, and eBay
I have tested banking apps like Chase, Bank of America, and Wells Fargo
Q371. Difference between decision tree and decision table
Decision tree is a graphical representation of decisions and their possible consequences, while decision table is a tabular representation of decisions and their corresponding actions.
Decision tree is a visual representation of a decision-making process, where each branch represents a possible decision and its outcome.
Decision table is a table that lists all possible combinations of conditions and actions, making it easier to determine the appropriate action for a given set o...read more
Q372. Explain me what is Encapsulation
Encapsulation is the process of hiding implementation details and restricting access to an object's properties and methods.
Encapsulation helps in achieving data abstraction and security.
It allows for better control over the data and prevents unauthorized access.
Encapsulation is implemented using access modifiers such as public, private, and protected.
For example, a bank account class may have private variables for account number and balance, and public methods for deposit and...read more
Q373. How can digital initiatives help in building a resilient organization?
Digital initiatives can enhance organizational resilience through increased agility, efficiency, and innovation.
Digital tools can enable remote work and collaboration, ensuring business continuity during disruptions.
Data analytics can provide real-time insights for informed decision-making and risk management.
Automation can streamline processes and reduce costs, freeing up resources for strategic investments.
Digital platforms can facilitate customer engagement and feedback, d...read more
Q374. what we have to do if we want to arrange the icons on the desktop
Q375. If I could use only one statement to review the overall health of a company, which statement would I use, and why? ...
The statement that would best review the overall health of a company is the income statement.
The income statement provides a comprehensive overview of a company's financial performance over a specific period.
It shows the company's revenues, expenses, and net income, allowing for analysis of profitability.
By examining the income statement, one can assess the company's ability to generate profits and manage costs.
It also helps in evaluating the company's revenue growth, margins...read more
Q376. Explain the different types of Database backups and backup strategies used in your current organisation
Different types of database backups include full, incremental, differential, and snapshot backups.
Full backups: Backs up the entire database
Incremental backups: Backs up only the data that has changed since the last backup
Differential backups: Backs up all changes made since the last full backup
Snapshot backups: Captures the state of the database at a specific point in time
Backup strategies may include a combination of these types to ensure data integrity and minimize downtim...read more
Q377. What is the treatment for bad debts received.
Bad debts received are written off as an expense in the income statement.
Bad debts are uncollectible debts that are written off as an expense in the income statement.
The amount of bad debts is subtracted from the accounts receivable balance.
The entry to write off bad debts is a debit to bad debt expense and a credit to accounts receivable.
The write-off of bad debts reduces the company's net income and assets.
Example: If a company has $10,000 in accounts receivable and $500 in...read more
Q378. What is entry of prepaid expense?
Prepaid expense is an accounting concept where an expense is paid in advance before it is incurred.
Prepaid expense is recorded as an asset on the balance sheet.
It is gradually recognized as an expense over time or as the benefit is received.
Common examples of prepaid expenses include prepaid rent, prepaid insurance, and prepaid subscriptions.
To record the entry of prepaid expense, debit the prepaid expense account and credit the cash or accounts payable account.
As the prepaid...read more
Q379. what is the use of container to development abap object. to display output in the screen container is used .
Containers are used in ABAP development to display output on the screen.
Containers are used to hold and display UI elements in ABAP programs.
They can be used to display text, images, tables, and other UI components.
Containers can be added to screens using the SAP GUI for Windows or Web Dynpro ABAP technology.
Example: DATA container TYPE REF TO cl_gui_container.
Example: container->add( text ).
Q380. What are the golden rules and general journal entries for the purchase of goods?
Golden rules and general journal entries for purchasing goods
Debit the Purchases account for the cost of goods purchased
Credit the Accounts Payable account for the amount owed to the supplier
If cash is paid, credit the Cash account
If a discount is received, credit the Discount Received account
If taxes are paid, credit the Taxes Paid account
Q381. How to decide when to use custom workflow and plugin?
Custom workflows and plugins are used based on specific requirements and functionality needed.
Custom workflows are useful when there is a need for a specific business process that is not available in the out-of-the-box workflows.
Plugins are useful when there is a need for custom business logic that cannot be achieved through configuration or workflows.
Consider the complexity of the requirement and the impact on performance before deciding to use custom workflows or plugins.
Ex...read more
Q382. You have Product { ProductName, Price...} which collection do you use to sort this, and how do you sort
I would use a List collection and sort by Price in ascending order.
Use List collection for dynamic size and easy sorting
Sort by Price in ascending order using built-in sorting methods
Example: List
products = new List (); products.Sort((x, y) => x.Price.CompareTo(y.Price));
Q383. What do you understand from Micromax’s recent advertising campaigns? Why has it cast Hugh Jackman?
Micromax's recent advertising campaigns feature Hugh Jackman to enhance brand image and appeal to a global audience.
Micromax's recent advertising campaigns aim to strengthen the brand's image and increase its global appeal.
The inclusion of Hugh Jackman, a globally recognized actor, helps to create a strong association with the brand.
Hugh Jackman's popularity and charisma can attract a wider audience and generate interest in Micromax products.
The use of a celebrity endorsement...read more
Q384. 5.what is difference between isnull and is blank? 6.what is the primitive data types? 7.what is the difference between workflow and trigger?
Difference between isnull and is blank, primitive data types, and difference between workflow and trigger.
isnull is used to check if a value is null or not, while is blank is used to check if a value is empty or consists only of whitespace characters.
Primitive data types are basic data types provided by a programming language, such as integers, floats, booleans, and characters.
A workflow is a series of steps or actions that are executed in a specific order to automate a busin...read more
Q385. What is polymorphism? And real time examples
Polymorphism is the ability of an object to take on many forms. It allows objects of different classes to be treated as if they were of the same class.
Polymorphism is achieved through method overriding and method overloading.
Real-time examples include function overloading, operator overloading, and inheritance.
In function overloading, multiple functions can have the same name but different parameters.
In operator overloading, operators like +, -, * can be overloaded to work wi...read more
Q386. What are the indexes you used ? Diff between bitmap and btree index
Indexes used include bitmap and btree. Bitmap index is used for low cardinality columns, while btree index is used for high cardinality columns.
Bitmap index is efficient for low cardinality columns with few distinct values
Btree index is efficient for high cardinality columns with many distinct values
Bitmap index uses bitmaps to represent the presence of a value in a column
Btree index is a balanced tree structure that allows for fast searching and retrieval of data
Q387. Explain about Unit Testing and how it is useful?
Unit testing is a software testing method where individual units or components of a software are tested in isolation.
Helps in identifying bugs early in the development cycle
Ensures that each unit of code is working as expected
Facilitates code refactoring and maintenance
Improves code quality and reduces the risk of regression
Automated unit tests can be run frequently to catch issues quickly
Q388. Case Study on Digital Marketing Strategy for a European Fashion Brand to enter Indian market with only online store - Objective, Targeting, Channel Strategy, Budget Allocation, Campaign Impact Measurement
Digital marketing strategy for a European fashion brand to enter Indian market with only online store.
Objective: Increase brand awareness and drive online sales.
Targeting: Young, fashion-conscious Indian consumers through social media and influencer marketing.
Channel Strategy: Focus on social media platforms like Instagram and Facebook, as well as fashion blogs and online fashion magazines.
Budget Allocation: Majority of budget allocated towards social media advertising and in...read more
Q389. What is final account and balance sheet. difference between.
Final account and balance sheet are financial statements used to summarize a company's financial position.
Final account is a statement of all the accounts in a ledger, showing the balances of each account.
Balance sheet is a financial statement that shows a company's assets, liabilities, and equity at a specific point in time.
Final account is prepared before the balance sheet.
Balance sheet is prepared after the final account.
Final account is used to prepare the balance sheet.
B...read more
Q390. What is depreciation
Depreciation is the decrease in value of an asset over time due to wear and tear, obsolescence or other factors.
Depreciation is a non-cash expense that reduces the value of an asset on the balance sheet.
It is calculated based on the useful life of the asset and the method of depreciation chosen.
Examples of assets that can be depreciated include buildings, vehicles, machinery, and equipment.
Depreciation can be straight-line, accelerated, or units of production method.
Depreciat...read more
Q391. Example- Explain STO process? How will you differentiate if a PO with document type NB is an STO.
STO process is a Stock Transport Order process used to transfer goods between plants in different locations.
STO process involves creating a purchase order (PO) with document type UB.
The delivering plant creates a delivery document and the receiving plant creates a goods receipt document.
If a PO with document type NB is an STO, it means that it is not an STO but a standard PO for external procurement.
The document type NB is used for standard POs while UB is used for STOs.
Q392. Reverse string, find second highest number , string vs string buffer , hash map vs hash set, instance & local variable, primitive and non primitive data type, overloading vs overriding , explain framework
Interview questions for QA Engineer
Reverse a string using StringBuilder or StringBuffer
Find second highest number by sorting the array and accessing the second last element
String is immutable while StringBuffer is mutable
HashMap stores key-value pairs while HashSet stores only keys
Instance variables are declared inside a class while local variables are declared inside a method
Primitive data types are int, float, double, etc. while non-primitive data types are arrays, classes,...read more
Q393. How would you measure the stack space without using the task manager, when an application is running on a computer? Write an algorithm if possible!!!
To measure stack space without task manager, monitor memory usage and track stack pointer changes.
Monitor memory usage of the application using system calls or profiling tools.
Track changes in the stack pointer register to estimate stack space usage.
Calculate the difference between initial and final stack pointer values to determine stack space used.
Use tools like Valgrind, GDB, or custom memory profiling libraries for detailed analysis.
Q394. What is Trade lifecycle
Trade lifecycle refers to the various stages involved in the execution and settlement of a trade.
Trade initiation: The process begins with the decision to buy or sell a financial instrument.
Order placement: The trade is then placed with a broker or through an electronic trading platform.
Trade execution: The order is matched with a counterparty and the trade is executed.
Confirmation: Both parties receive trade confirmations detailing the trade details.
Clearing and settlement: ...read more
Q395. What is record producer? How many ways we can call server script in client side? Few servicenow best practices we should follow. Workflow activities.
Record producer is a feature in ServiceNow that allows users to create records in a guided manner.
Record producer provides a user-friendly interface for creating records with predefined templates and fields.
Server scripts can be called in client side using GlideAjax, g_form.getReference, and g_scratchpad.
Some ServiceNow best practices include using naming conventions, documenting changes, and testing in sub-production instances.
Workflow activities in ServiceNow include approv...read more
Q396. What are the steps to add a shared mailbox in the Outlook client? Why might it be difficult to uninstall an application at times?
To add a shared mailbox in Outlook, you need to have the necessary permissions and follow specific steps. Uninstalling an application can be difficult due to dependencies and system restrictions.
Ensure you have the necessary permissions to access the shared mailbox
In Outlook, go to File > Account Settings > Account Settings
Select your email account and click Change
Click More Settings > Advanced tab > Add
Enter the email address of the shared mailbox and click OK
To uninstall an...read more
Q397. What is CDS Views ? Syntax to create parameter based views? syntax to create Association. How to publish CDS views
CDS Views are virtual database views in SAP HANA. They can be parameter-based and have associations. They are published using annotations.
CDS Views are virtual database views in SAP HANA
Syntax to create parameter-based views: @AbapCatalog.sqlViewName: 'view_name' @AccessControl.authorizationCheck: #NOT_REQUIRED define view view_name(parameter_name) as select from table_name where field_name = :parameter_name
Syntax to create Association: define view view_name as select from en...read more
Q398. What is the use of Authorization how it is helpful explain with any example? how its created? have you ever?
Authorization in SAP ABAP Hana Developer is used to control access to specific functionalities or data within the system.
Authorization is helpful in ensuring that only authorized users can perform certain actions or access certain data in the system.
It helps in maintaining data security and preventing unauthorized access.
Authorizations are created using roles, profiles, and authorization objects in SAP.
For example, a user may be assigned a role that allows them to create purc...read more
Q399. what is quable apex in salesforce
Quable Apex is a tool that allows developers to write and test Apex code in a more efficient and organized way.
Quable Apex provides a structured way to organize Apex code
It allows developers to write and test code in a more efficient manner
Quable Apex includes features such as code versioning and deployment management
It can be integrated with Salesforce's development tools such as the Force.com IDE
Q400. What is directive and what are the different types of directive? What is Angular life cycle hook? Difference between ngOnChanges(), ngOnInit() and ngDoCheck()? What is closure? What is Hoisting? what is Lazy lo...
read moreDirectives in Angular are markers on a DOM element that tell Angular to attach a specific behavior to that element or transform the DOM element and its children.
Types of directives: Structural directives (ngIf, ngFor) and Attribute directives (ngModel, ngStyle)
Angular life cycle hook: A set of methods that Angular calls on a directive/component at defined points in time
Difference between ngOnChanges(), ngOnInit() and ngDoCheck(): ngOnChanges() is called when an input binding ...read more
More about working at Accenture
Top HR Questions asked in ZeMoSo Technologies
Interview Process at ZeMoSo Technologies
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month