Accenture
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I was interviewed before Jul 2020.
Incremental backup only backs up changes since last backup, while differential backs up changes since full backup.
Incremental backup saves time and storage space compared to full backup.
Differential backup requires less time to restore data compared to incremental backup.
Example: Incremental backup of a file system only backs up files that have changed since last backup.
Example: Differential backup of a database backs
Backup process is a method of creating copies of data to protect against data loss.
Identify critical data to be backed up
Choose a backup method (full, incremental, differential)
Select a backup location (on-site, off-site, cloud)
Schedule regular backups
Test backups to ensure data can be restored
Monitor backup process for errors or failures
Data life cycle management is the process of managing data from creation to deletion.
It involves organizing, storing, protecting, and disposing of data.
It ensures data is available, accurate, and secure throughout its life cycle.
Examples include backup and recovery, archiving, and data retention policies.
Active Directory Schema defines the structure of objects in an AD forest.
It determines the attributes and object classes that can be used to create objects in AD.
It is stored in the Configuration partition of the AD database.
It can be extended to include custom attributes and object classes.
Changes to the schema should be carefully planned and tested before implementation.
FSMO roles are specialized domain controller roles in Active Directory.
There are 5 FSMO roles: Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master.
Schema Master: responsible for maintaining and modifying the Active Directory schema.
Domain Naming Master: responsible for adding or removing domains in the forest.
RID Master: responsible for allocating RIDs (Relative Identifiers) to doma...
DNS name resolution process translates domain names to IP addresses.
Client sends a request to DNS resolver.
Resolver checks its cache for the IP address.
If not found, resolver sends a request to root DNS server.
Root server responds with the address of TLD server.
TLD server responds with the address of authoritative DNS server.
Authoritative server responds with the IP address.
Resolver caches the IP address and sends it t...
I applied via Naukri.com and was interviewed in Nov 2024. There were 2 interview rounds.
Basic questions of aptitide of class 8 mathematics questions
The basic curriculum of class 8 covers subjects like Mathematics, Science, Social Studies, English, and a second language.
Subjects include Mathematics, Science, Social Studies, English, and a second language
Topics in Mathematics may include algebra, geometry, and arithmetic
Science topics may cover biology, chemistry, and physics
Social Studies may include history, geography, and civics
English may cover grammar, literatu
What people are saying about Accenture
90 QUESTIONS 90 MINUTES ,2 CODING QUESTIONS
Accenture interview questions for designations
I applied via Naukri.com and was interviewed before Mar 2022. There were 2 interview rounds.
Get interview-ready with Top Accenture Interview Questions
I applied via Walk-in
I applied via Referral and was interviewed in Oct 2023. There were 2 interview rounds.
Hacking an Instagram account is illegal and unethical.
It is illegal and unethical to hack into someone's Instagram account.
Phishing scams may be used to trick users into giving away their login information.
Brute force attacks can be attempted to guess the password.
Social engineering techniques may be used to manipulate the account owner into revealing their login details.
Hacking an Instagram account is illegal and unethical. It involves unauthorized access to someone's personal information.
Hacking into someone's Instagram account is a violation of privacy and against the law.
Phishing scams, social engineering, and password cracking are common methods used to hack Instagram accounts.
Using software or tools to brute force passwords or exploit vulnerabilities in Instagram's security can a
Gd ON CURRENT AFFAIR TOPICS AND THANKS FOR ASKING
I applied via Job Fair and was interviewed in Apr 2023. There were 2 interview rounds.
Basis is the technical foundation of SAP systems. Work process is a unit of work that executes in the SAP system.
Basis is responsible for the installation, configuration, and maintenance of SAP systems.
Work process is a unit of work that executes in the SAP system and is responsible for processing user requests.
There are different types of work processes such as dialog, background, spool, and update processes.
Dialog wo...
Basis is the technical foundation of SAP systems. Work process kernel is the core component of SAP Basis.
Basis is responsible for the technical infrastructure of SAP systems.
It includes components like database management, system monitoring, and user administration.
Work process kernel is the core component of Basis that manages the work processes of SAP applications.
It ensures that the work processes are distributed ev...
based on 6 interviews
1 Interview rounds
based on 38 reviews
Rating in categories
Application Development Analyst
39k
salaries
| ₹3 L/yr - ₹12 L/yr |
Application Development - Senior Analyst
27k
salaries
| ₹6.9 L/yr - ₹20.2 L/yr |
Team Lead
24.3k
salaries
| ₹7.1 L/yr - ₹25.4 L/yr |
Senior Software Engineer
18.3k
salaries
| ₹6 L/yr - ₹19.5 L/yr |
Software Engineer
17.5k
salaries
| ₹3.6 L/yr - ₹12.9 L/yr |
TCS
Cognizant
Capgemini
Infosys