Add office photos
Employer?
Claim Account for FREE

Atos

3.8
based on 4.2k Reviews
Video summary
Filter interviews by

100+ Conneqt Business Solutions Interview Questions and Answers

Updated 31 Mar 2025
Popular Designations

Q101. how is yum command used ?

Ans.

yum command is used to install, update, remove, or manage packages on Linux systems.

  • Install a package: yum install package_name

  • Update all packages: yum update

  • Remove a package: yum remove package_name

  • List available packages: yum list available

Add your answer

Q102. What is java script?

Ans.

JavaScript is a programming language used to create interactive effects within web browsers.

  • JavaScript is used for client-side scripting, server-side scripting, and mobile app development.

  • It can be used to create dynamic web pages, validate forms, and create animations.

  • JavaScript is often used in conjunction with HTML and CSS.

  • Popular JavaScript frameworks include React, Angular, and Vue.

Add your answer

Q103. What is overriding?

Ans.

Overriding is a feature in object-oriented programming where a subclass provides a specific implementation of a method that is already provided by its parent class.

  • Overriding is used to implement runtime polymorphism

  • The method signature of the overridden method must be the same as the parent class method

  • The access level of the overriding method cannot be more restrictive than the overridden method

  • Example: A Dog class can override the bark() method of its Animal parent class t...read more

Add your answer

Q104. What is binary tree?

Ans.

A binary tree is a tree data structure in which each node has at most two children, referred to as the left and right child.

  • Consists of nodes with at most two children

  • The left child is always less than the parent node

  • The right child is always greater than the parent node

  • Used in search algorithms like binary search

  • Examples include AVL tree, red-black tree, and binary search tree

Add your answer
Discover Conneqt Business Solutions interview dos and don'ts from real experiences

Q105. Diff between regression and retesting

Ans.

Regression testing ensures that new code changes do not negatively impact existing functionality, while retesting focuses on verifying that a specific bug or issue has been fixed.

  • Regression testing is performed to ensure that new code changes do not introduce new bugs or issues.

  • Retesting is done to verify that a specific bug or issue has been fixed after it has been reported.

  • Regression testing is typically done on a broader scale, covering multiple functionalities, while rete...read more

Add your answer

Q106. Difference between JVM, JRE and JDK.

Ans.

JVM is a virtual machine that executes Java bytecode. JRE is a runtime environment that includes JVM and necessary libraries. JDK is a development kit that includes JRE and tools for developing Java applications.

  • JVM stands for Java Virtual Machine and is responsible for executing Java bytecode.

  • JRE stands for Java Runtime Environment and includes JVM and necessary libraries to run Java applications.

  • JDK stands for Java Development Kit and includes JRE along with tools for devel...read more

Add your answer
Are these interview questions helpful?

Q107. difference between Infrastructure and Development

Ans.

Infrastructure refers to the basic physical and organizational structures needed for the operation of a society or enterprise, while development refers to the process of growth, progress, or advancement.

  • Infrastructure includes roads, bridges, buildings, and utilities necessary for a society to function.

  • Development involves the improvement or advancement of systems, processes, or technologies.

  • Infrastructure is typically fixed and long-lasting, while development is ongoing and ...read more

Add your answer

Q108. What is SMB relay attack

Ans.

SMB relay attack is a type of attack where an attacker intercepts and relays SMB traffic to gain unauthorized access to a target system.

  • The attacker intercepts SMB traffic between two systems and relays it to gain access to the target system.

  • The attack can be carried out using tools like Responder or Metasploit.

  • The attack can be prevented by disabling SMBv1, using SMB signing, and implementing network segmentation.

  • An example of SMB relay attack is the infamous WannaCry ransom...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q109. What are u negatives and positives

Ans.

Positives include strong analytical skills and attention to detail. Negatives may include lack of experience or difficulty working in a team.

  • Positives: strong analytical skills, attention to detail, ability to work independently

  • Negatives: lack of experience, difficulty working in a team, limited knowledge of specific tools or technologies

Add your answer

Q110. which all subjects u like the most

Ans.

I enjoy subjects like mathematics, physics, and literature.

  • Mathematics: I love solving complex equations and finding patterns.

  • Physics: I am fascinated by the laws of nature and how they govern the universe.

  • Literature: I enjoy reading and analyzing different literary works, exploring the depths of human emotions and experiences.

Add your answer

Q111. what is DDOS, CIA Triad, Encryption, etc

Ans.

DDOS is a cyber attack that floods a network or server with traffic to make it unavailable. CIA Triad is a security model. Encryption is a method of securing data.

  • DDOS stands for Distributed Denial of Service

  • CIA Triad stands for Confidentiality, Integrity, and Availability

  • Encryption is the process of converting plain text into a coded message to prevent unauthorized access

  • Examples of encryption include SSL, AES, and RSA

Add your answer

Q112. What do you know about Atos

Ans.

Atos is a global leader in digital transformation, providing IT services and consulting.

  • Atos is a multinational IT services corporation based in France

  • They specialize in digital transformation, cybersecurity, cloud services, and high-performance computing

  • Atos has a strong presence in various industries including healthcare, finance, and manufacturing

Add your answer

Q113. How to manage different stakeholders

Ans.

Managing different stakeholders involves effective communication, building relationships, and understanding their needs and priorities.

  • Identify key stakeholders and their interests

  • Communicate regularly and clearly with stakeholders

  • Address concerns and conflicts promptly

  • Build trust and relationships with stakeholders

  • Understand the priorities and goals of each stakeholder group

Add your answer

Q114. Explain different ransomware attacks

Ans.

Ransomware attacks encrypt files and demand payment for decryption.

  • Encrypts files and demands payment for decryption

  • May use social engineering tactics to trick victims into downloading malware

  • May spread through phishing emails, malicious websites, or infected software

  • Examples include WannaCry, Petya, and Locky

Add your answer

Q115. What is blackdrop?

Ans.

Blackdrop is a term used in photography to describe the darkest part of an image.

  • It is the area of the photograph with the least amount of light.

  • It is often used to create contrast and depth in an image.

  • In post-processing, adjusting the blackdrop can enhance the overall look of the photograph.

Add your answer

Q116. What is Overloading in OOPS

Ans.

Overloading in OOPS is the ability to define multiple methods in a class with the same name but different parameters.

  • Allows multiple methods with the same name but different parameters

  • Parameters can be different in number, type, or order

  • Helps in improving code readability and reusability

  • Example: having multiple constructors in a class with different parameters

Add your answer

Q117. What is Method Overloading

Ans.

Method overloading is the ability to define multiple methods with the same name but different parameters.

  • Method overloading allows a class to have multiple methods with the same name but different parameters.

  • It helps in improving code readability and reusability.

  • The compiler determines which method to call based on the number, type, and order of the parameters.

  • Example: int add(int a, int b) and int add(int a, int b, int c) are overloaded methods.

Add your answer

Q118. what is accrual entry ?

Ans.

Accrual entry is a journal entry made to record revenue or expenses that have been earned or incurred but not yet received or paid.

  • Accrual entry is used to match revenue and expenses to the period in which they were earned or incurred.

  • It is recorded as a debit to an expense or asset account and a credit to a liability or revenue account.

  • Examples of accrual entries include recording unpaid salaries, interest on loans, and accounts receivable.

  • Accrual entry is important for accu...read more

Add your answer

Q119. How was written test?

Ans.

The written test was challenging but fair.

  • The test covered a wide range of topics

  • There were both multiple choice and essay questions

  • The time given for the test was sufficient

  • The questions were well-structured and clear

  • Overall, the test accurately assessed the knowledge and skills required

Add your answer

Q120. What are types of derivatives

Ans.

Types of derivatives include options, futures, forwards, and swaps.

  • Options: Contracts that give the holder the right, but not the obligation, to buy or sell an asset at a specified price before or on a specified date.

  • Futures: Contracts that obligate the buyer to purchase an asset or the seller to sell an asset at a predetermined future date and price.

  • Forwards: Similar to futures, but customized contracts traded over-the-counter rather than on an exchange.

  • Swaps: Contracts wher...read more

Add your answer

Q121. Compare them with java?

Ans.

Python is a dynamically typed language with simpler syntax and better readability than Java.

  • Python has a simpler syntax than Java

  • Python is dynamically typed while Java is statically typed

  • Python has better readability than Java

  • Python has a larger standard library than Java

  • Java is faster than Python in terms of execution speed

Add your answer

Q122. Compare TCP UDP with examples?

Ans.

TCP is a reliable, connection-oriented protocol while UDP is unreliable and connectionless.

  • TCP ensures data delivery and error checking while UDP does not.

  • TCP is slower but more secure while UDP is faster but less secure.

  • TCP is used for applications like email, file transfer, and web browsing while UDP is used for applications like video streaming and online gaming.

Add your answer

Q123. Golden rules of accounting Email draft

Ans.

Golden rules of accounting are basic principles that guide the process of recording financial transactions.

  • The three golden rules of accounting are: Debit what comes in, Credit what goes out, and Debit the receiver, Credit the giver.

  • These rules help ensure that financial transactions are accurately recorded and balanced.

  • For example, when a company receives cash from a customer, it would debit the cash account (what comes in) and credit the accounts receivable account (what go...read more

Add your answer

Q124. Write down some sql querry

Ans.

SQL query to retrieve employee names and salaries from a table

  • SELECT name, salary FROM employees

  • FROM employees

  • WHERE department = 'IT'

Add your answer

Q125. Salesforce CRM and ERP handling experience

Ans.

I have 3 years of experience handling Salesforce CRM and ERP systems.

  • Implemented customizations and configurations in Salesforce CRM to meet business requirements

  • Integrated Salesforce CRM with ERP systems for seamless data flow

  • Provided training and support to end users on Salesforce CRM and ERP usage

Add your answer

Q126. What is Inheritance in OOPS

Ans.

Inheritance in OOPS allows a class to inherit properties and behavior from another class.

  • Child class inherits attributes and methods from a parent class

  • Helps in code reusability and promotes the concept of hierarchy

  • Types of inheritance include single, multiple, multilevel, and hierarchical

  • Example: Class Animal can be a parent class with attributes like name and methods like eat, and Class Dog can inherit from Animal with additional methods like bark

Add your answer

Q127. What’s unit based pricing

Add your answer

Q128. What is your SAP experience?

Ans.

I have over 5 years of experience working with SAP in various industries.

  • Implemented SAP modules such as FI/CO, MM, and SD for clients

  • Led SAP system upgrades and migrations

  • Provided training and support to end users

  • Developed custom reports and interfaces using SAP ABAP

View 1 answer

Q129. Explain APQP process

Ans.

APQP is a quality framework used in product development to ensure customer satisfaction.

  • APQP stands for Advanced Product Quality Planning

  • It involves defining the steps needed to ensure a product meets customer requirements

  • Key elements include design and process FMEAs, control plans, and PPAP

  • APQP is typically used in automotive and manufacturing industries

Add your answer

Q130. What is 3 way hand shaking

Ans.

3 way hand shaking is a process in TCP/IP communication where three packets are exchanged to establish a connection.

  • Three packets are involved: SYN, SYN-ACK, ACK

  • SYN packet is sent by the client to the server to initiate the connection

  • SYN-ACK packet is sent by the server to the client as a response

  • ACK packet is sent by the client to the server to confirm the connection

Add your answer

Q131. Business Rules and Types of business Rules

Ans.

Business rules are server-side scripts that run when a record is displayed, inserted, updated, deleted, or when a table is queried.

  • Business rules automate processes and enforce data consistency.

  • There are two types of business rules: client-side and server-side.

  • Client-side business rules run on the browser and server-side business rules run on the server.

  • Business rules can be used to set field values, run scripts, display messages, and more.

Add your answer

Q132. Explain about RTM

Ans.

RTM stands for Requirements Traceability Matrix, a document that links requirements to test cases to ensure all requirements are covered.

  • RTM helps in tracking the progress of requirements coverage in testing

  • It ensures that all requirements have corresponding test cases

  • RTM is a useful tool for managing changes in requirements and their impact on testing

  • It helps in identifying any gaps or missing test cases in the testing process

Add your answer

Q133. Lifecycle of a claim

Ans.

The lifecycle of a claim involves submission, processing, adjudication, and payment.

  • Submission: Claim is submitted by the provider to the insurance company.

  • Processing: Insurance company reviews the claim for accuracy and completeness.

  • Adjudication: Insurance company determines the amount to be paid based on policy coverage.

  • Payment: Once adjudicated, the insurance company pays the provider.

  • Example: A patient visits a doctor, the doctor submits a claim to the insurance company, ...read more

Add your answer

Q134. What is the capital market?

Ans.

The capital market is a financial market where individuals and institutions trade financial securities.

  • It is a market for buying and selling long-term debt or equity-backed securities.

  • It includes stock exchanges and over-the-counter markets.

  • Investors can buy and sell stocks, bonds, and other financial instruments in the capital market.

  • It helps companies raise capital for expansion and growth.

  • Examples include the New York Stock Exchange (NYSE) and NASDAQ.

Add your answer

Q135. What are types of insurance

Ans.

Types of insurance include health, life, auto, home, and disability insurance.

  • Health insurance covers medical expenses

  • Life insurance provides financial protection to beneficiaries in case of death

  • Auto insurance covers damages and liabilities related to vehicles

  • Home insurance protects against damages to the home and belongings

  • Disability insurance provides income replacement in case of disability

Add your answer

Q136. SAP workflow with other modules connections.

Ans.

SAP Workflow integrates with various modules to automate processes and enhance efficiency across the organization.

  • Workflow can connect SAP HCM with SAP Finance for payroll processing, ensuring timely salary disbursement.

  • Integration with SAP MM allows for automated approval workflows for employee requisitions and purchase orders.

  • SAP CRM can utilize workflows to manage customer-related processes, such as onboarding new clients or handling service requests.

  • In SAP SuccessFactors,...read more

Add your answer

Q137. Recent achievements How to manage attrition

Ans.

To manage attrition, focus on employee engagement, career development, and creating a positive work culture.

  • Regularly conduct employee engagement surveys to identify areas of improvement

  • Offer career development opportunities and training programs

  • Create a positive work culture by promoting work-life balance and recognizing employee achievements

  • Provide competitive compensation and benefits packages

  • Maintain open communication channels with employees to address concerns and feedb...read more

Add your answer

Q138. What is Polymorphism in OOPS

Ans.

Polymorphism in OOP refers to the ability of a single function or method to operate on different data types.

  • Polymorphism allows objects of different classes to be treated as objects of a common superclass.

  • There are two types of polymorphism: compile-time (method overloading) and runtime (method overriding).

  • Example: Inheritance allows a child class to override a method of its parent class, providing different functionality.

Add your answer

Q139. What is revenue expenditure

Ans.

Revenue expenditure refers to the costs incurred by a business to maintain its operations and generate revenue in the short term.

  • Includes expenses for raw materials, utilities, salaries, rent, and repairs

  • These costs are deducted from revenue in the same accounting period

  • Helps in generating immediate benefits for the business

  • Contrast with capital expenditure which involves long-term investments

Add your answer

Q140. What is capital expenditure

Ans.

Capital expenditure refers to funds used by a company to acquire, upgrade, or maintain physical assets such as property, buildings, or equipment.

  • Capital expenditure is a long-term investment in the company's infrastructure or assets.

  • It is not considered a regular operating expense, but rather an investment in the company's future growth.

  • Examples include purchasing new equipment, building a new facility, or upgrading technology systems.

  • Capital expenditure is typically recorded...read more

Add your answer

Q141. Why atos? Coding skills required

Ans.

Atos is a leading global IT services company with a strong focus on automation and coding skills.

  • Atos is a well-established global IT services company known for its expertise in automation and coding.

  • They have a strong reputation for delivering innovative solutions to clients using cutting-edge technologies.

  • Working at Atos will provide opportunities to enhance coding skills and work on challenging automation projects.

  • Atos values employees who are proficient in coding and have...read more

Add your answer

Q142. What are derivatives?

Ans.

Derivatives are financial instruments whose value is derived from an underlying asset or group of assets.

  • Derivatives can be used for hedging, speculation, or arbitrage.

  • Common types of derivatives include options, futures, forwards, and swaps.

  • Derivatives allow investors to take on risk or hedge against risk in the financial markets.

  • Example: A call option on a stock gives the holder the right to buy the stock at a specified price within a certain time frame.

View 1 answer

Q143. Why Atos?

Ans.

Atos is a global leader in digital transformation and offers a wide range of opportunities for career growth and development.

  • Atos is a renowned global company with a strong presence in the digital transformation industry.

  • They provide innovative solutions and services to clients across various sectors.

  • Atos offers a diverse range of projects and opportunities for learning and development.

  • The company values its employees and fosters a collaborative and inclusive work culture.

  • Ato...read more

Add your answer

Q144. Any plans for higher studies

Ans.

Yes, I am planning to pursue higher studies in the near future.

  • I am interested in pursuing a Master's degree in my field of study.

  • I have been researching various universities and programs that align with my career goals.

  • I plan to take the necessary exams and complete the application process within the next year.

  • I believe that continuing my education will not only enhance my knowledge and skills but also open up new opportunities for me.

Add your answer

Q145. What is the use of Java

Ans.

Java is a versatile programming language used for developing a wide range of applications, from web and mobile apps to enterprise systems.

  • Java is used for developing web applications, mobile applications, desktop applications, and enterprise systems.

  • It is commonly used in backend development for server-side programming.

  • Java is also used in game development, scientific applications, and big data processing.

  • It is platform-independent, meaning Java programs can run on any device...read more

Add your answer

Q146. How to implement singleton pattern

Ans.

Singleton pattern ensures a class has only one instance and provides a global point of access to it.

  • Create a private static instance variable of the class itself

  • Make the constructor private to prevent instantiation from outside the class

  • Provide a static method to access the singleton instance

Add your answer

Q147. Events in Reports?

Ans.

Events in reports refer to significant occurrences or incidents that are documented and reported.

  • Events can include accidents, incidents, errors, or unusual incidents.

  • Reports should include details such as the date, time, location, and individuals involved.

  • Events should be documented accurately and objectively.

  • Reports should be reviewed and analyzed to identify trends and areas for improvement.

  • Examples of events in reports include patient falls, medication errors, and equipme...read more

Add your answer

Q148. What is the employee satisfaction

Add your answer

Q149. What is Inheritance

Ans.

Inheritance is a concept in object-oriented programming where a class inherits properties and behaviors from another class.

  • Inheritance allows for code reuse and promotes modularity.

  • The class that is being inherited from is called the superclass or base class.

  • The class that inherits from the superclass is called the subclass or derived class.

  • The subclass can access the public and protected members of the superclass.

  • Inheritance can be single, where a subclass inherits from only...read more

Add your answer

Q150. Star Pattern Print in C

Ans.

Printing star patterns in C using loops and nested loops.

  • Use nested loops to print the desired pattern.

  • Use a combination of spaces and stars to create the pattern.

  • Experiment with different loop structures to create various patterns.

Add your answer

Q151. How domain migration work.

Ans.

Domain migration involves transferring data, applications, and infrastructure from one domain to another.

  • Assess current domain setup and requirements for new domain

  • Plan migration strategy including timeline and resources

  • Backup data and applications to prevent loss

  • Test migration process in a controlled environment

  • Execute migration with minimal downtime and disruptions

  • Verify data integrity and functionality post-migration

  • Update configurations and settings to align with new doma...read more

Add your answer

Q152. How you troubalshoot AD issue

Ans.

To troubleshoot AD issues, I analyze logs, check network connectivity, verify DNS settings, and test user authentication.

  • Analyze event logs for any errors or warnings related to Active Directory

  • Check network connectivity between the domain controller and client machines

  • Verify DNS settings to ensure proper resolution of domain controller names

  • Test user authentication by logging in with different user accounts

Add your answer

Q153. What are financial markets?

Ans.

Financial markets are platforms where buyers and sellers trade financial assets like stocks, bonds, and currencies.

  • Types of financial markets include stock markets (e.g., NYSE, NASDAQ) where shares of companies are traded.

  • Bond markets facilitate the buying and selling of debt securities, such as government bonds or corporate bonds.

  • Foreign exchange markets (Forex) allow for the trading of currencies, impacting global trade and investment.

  • Derivatives markets involve contracts l...read more

Add your answer

Q154. Relevant module experience

Ans.

I have experience in modules related to web development, database management, and API integration.

  • Web development frameworks such as React, Angular, and Vue.js

  • Database management systems like MySQL, MongoDB, and PostgreSQL

  • API integration using RESTful and GraphQL APIs

  • Experience with version control systems like Git and SVN

Add your answer

Q155. What's what in java?

Ans.

Java is an object-oriented programming language used for developing applications and software.

  • Java is platform-independent

  • Java is statically-typed

  • Java has automatic memory management

  • Java supports multithreading

  • Java has a vast standard library

  • Java is used for developing web, mobile, and desktop applications

Add your answer

Q156. Explain Projects

Ans.

Projects are specific tasks or assignments that require planning, execution, and completion within a set timeframe.

  • Projects have defined goals and objectives.

  • They involve a team of individuals working together towards a common goal.

  • Projects require resources such as time, money, and manpower.

  • They have a specific timeline or deadline for completion.

  • Examples: building a new website, launching a marketing campaign, developing a new product.

Add your answer

Q157. Do you know about python

Ans.

Yes, Python is a high-level programming language known for its simplicity and readability.

  • Python is widely used for web development, data analysis, artificial intelligence, and more

  • It has a large standard library and supports multiple programming paradigms

  • Python code is easy to read and maintain, making it popular among developers

Add your answer

Q158. Write code to automate a page

Ans.

Automate a page using code

  • Identify the elements on the page that need to be interacted with

  • Use a programming language like Python or JavaScript to write scripts for automation

  • Utilize tools like Selenium WebDriver for web automation

  • Consider using frameworks like TestNG or JUnit for test automation

Add your answer

Q159. What is abstract class

Ans.

An abstract class is a class that cannot be instantiated and is used as a blueprint for other classes to inherit from.

  • Cannot be instantiated directly

  • May contain abstract methods that must be implemented by subclasses

  • Can have both abstract and non-abstract methods

  • Used to define common behavior for subclasses

Add your answer

Q160. Different types of pricing

Add your answer

Q161. What Incident/SLA/OLA/KPI/CSF

Ans.

Incident/SLA/OLA/KPI/CSF are key performance indicators used to measure and manage the performance of incident management processes.

  • Incidents are unplanned interruptions or reductions in quality of IT services.

  • SLAs (Service Level Agreements) define the level of service expected by the customer.

  • OLAs (Operational Level Agreements) define the responsibilities of internal support teams.

  • KPIs (Key Performance Indicators) measure the effectiveness and efficiency of incident manageme...read more

Add your answer

Q162. SAP experience in Third party process

Add your answer

Q163. What is the personal behaviour

Add your answer

Q164. What is the employee benefits

Add your answer

Q165. what is scd type 2?

Ans.

SCD type 2 is a method used in data warehousing to track historical changes by creating a new record for each change.

  • SCD type 2 stands for Slowly Changing Dimension type 2

  • It involves creating a new record in the dimension table whenever there is a change in the data

  • The old record is marked as inactive and the new record is marked as current

  • It allows for historical tracking of changes in data over time

  • Example: If a customer changes their address, a new record with the updated ...read more

Add your answer

Q166. what is an lvm

Ans.

LVM stands for Logical Volume Manager, a tool used in Linux to manage storage by creating logical volumes from physical volumes.

  • LVM allows for dynamic resizing of logical volumes without disrupting data.

  • It provides features like snapshots, striping, mirroring, and thin provisioning.

  • Common LVM commands include pvcreate, vgcreate, lvcreate, lvextend, and lvresize.

Add your answer

Q167. how to create an lvm

Ans.

To create an LVM, you need to initialize physical volumes, create a volume group, and then create logical volumes within the volume group.

  • Initialize physical volumes using pvcreate command

  • Create a volume group using vgcreate command

  • Create logical volumes within the volume group using lvcreate command

Add your answer

Q168. how do incrementally load data

Ans.

Incremental data loading updates only new or changed data, improving efficiency and reducing load times.

  • Identify the source of data changes, such as timestamps or version numbers.

  • Use Change Data Capture (CDC) to track changes in the source database.

  • Implement a staging area to temporarily hold the incremental data before loading.

  • Schedule regular intervals for incremental loads, such as hourly or daily.

  • Example: Use SQL queries to fetch records where the last updated timestamp i...read more

Add your answer

Q169. Most complex solution designed?

Add your answer

Q170. Golden rules of accounting

Ans.

Golden rules of accounting are basic principles that guide the process of recording financial transactions.

  • There are three golden rules of accounting: Debit the receiver, Credit the giver; Debit what comes in, Credit what goes out; Debit expenses and losses, Credit income and gains.

  • These rules help ensure that the accounting equation (Assets = Liabilities + Equity) remains balanced.

  • For example, when a company receives cash from a customer, the cash account is debited (increas...read more

Add your answer

Q171. Flexible single masters options roles

Ans.

Flexible single masters options roles refer to the ability for individuals to have various roles within a single organization.

  • Flexible single masters options allow employees to take on different responsibilities within the same company.

  • This can include roles such as project manager, team lead, or subject matter expert.

  • Employees can develop a diverse skill set and contribute to different areas of the organization.

  • It promotes career growth and allows individuals to explore diff...read more

Add your answer

Q172. What is OSI Model

Ans.

The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

  • The OSI Model stands for Open Systems Interconnection Model.

  • It helps in understanding how data is transferred between devices in a network.

  • Each layer has specific functions and communicates with the adjacent layers.

  • Examples of layers include Physical, Data Link, Network, Transport, Session, Presentation, and Application.

Add your answer

Q173. What is firewall

Ans.

A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

  • Acts as a barrier between a trusted internal network and untrusted external network

  • Filters traffic based on rules set by the network administrator

  • Can be hardware-based or software-based

  • Examples include Cisco ASA, Palo Alto Networks, and pfSense

Add your answer

Q174. what are accruals

Ans.

Accruals are adjustments made to financial statements to recognize revenues and expenses when they are earned or incurred, regardless of when cash is exchanged.

  • Accruals help match revenues with expenses in the same accounting period

  • They are necessary for accurate financial reporting

  • Examples include accrued interest, accrued salaries, and accrued taxes

Add your answer

Q175. Pillars of OOPS.

Ans.

Pillars of OOPS are Abstraction, Encapsulation, Inheritance, and Polymorphism.

  • Abstraction: Hiding implementation details and showing only necessary information.

  • Encapsulation: Binding data and functions together and restricting access to them.

  • Inheritance: Acquiring properties and behavior of a parent class by a child class.

  • Polymorphism: Ability of an object to take many forms and perform different actions based on context.

Add your answer

Q176. EXPLAIN ABOUT booting process

Ans.

Booting process is the sequence of events that occur when a computer is turned on and starts up.

  • Power on self-test (POST) is performed to check hardware components

  • BIOS or UEFI firmware is loaded to initialize hardware

  • Boot loader is loaded to start the operating system

  • Operating system kernel is loaded into memory

  • User login prompt is displayed

Add your answer

Q177. Start to end project flow

Ans.

The project flow typically involves initiation, planning, execution, monitoring & controlling, and closing phases.

  • Initiation phase involves defining project objectives and scope.

  • Planning phase includes creating a detailed project plan, schedule, and budget.

  • Execution phase involves carrying out the project activities as per the plan.

  • Monitoring & controlling phase involves tracking progress, managing changes, and ensuring quality.

  • Closing phase includes completing all project de...read more

Add your answer

Q178. Business rule and their types?

Ans.

Business rules are server-side scripts that run when a record is displayed, inserted, updated, deleted, or when a table is queried.

  • Business rules are used to automate processes and enforce data consistency.

  • There are three types of business rules: before, after, and asynchronous.

  • Before business rules run before the database action is executed.

  • After business rules run after the database action is executed.

  • Asynchronous business rules run in the background and do not block the us...read more

Add your answer

Q179. Triggers in SQL

Ans.

Triggers in SQL are database objects that are automatically executed in response to specified events.

  • Triggers are used to enforce business rules, maintain data integrity, and automate tasks.

  • They can be defined to execute before or after an INSERT, UPDATE, or DELETE operation.

  • Triggers can be written in SQL or a procedural language like PL/SQL or T-SQL.

  • Examples of trigger events include inserting a new record, updating a specific column, or deleting a row.

  • Triggers can be used t...read more

Add your answer

Q180. Day to day activities?

Ans.

Day to day activities involve managing Azure DevOps pipelines, monitoring builds, resolving issues, collaborating with teams.

  • Managing Azure DevOps pipelines for continuous integration and deployment

  • Monitoring builds and deployments for any issues or failures

  • Resolving any issues that arise during the development process

  • Collaborating with development teams to ensure smooth workflow and communication

  • Implementing best practices for version control, code reviews, and automated tes...read more

Add your answer

Q181. technology used in prj

Ans.

Various technologies used in the project include Java, Spring Boot, Angular, MySQL, and Docker.

  • Java

  • Spring Boot

  • Angular

  • MySQL

  • Docker

Add your answer

Q182. What is FSMO roles

Ans.

FSMO roles are Flexible Single Master Operations roles in Active Directory that control specific operations within the domain.

  • FSMO roles are specialized tasks that can only be performed by one domain controller at a time.

  • There are five FSMO roles: Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master.

  • These roles are essential for the proper functioning of the Active Directory environment.

  • For example, the PDC Emulator role is responsible for ...read more

Add your answer

Q183. how to do mechanisim

Ans.

Mechanism refers to the process or system by which something operates or is achieved.

  • Understand the components involved in the system or process

  • Identify the interactions between the components

  • Determine the cause-effect relationships

  • Analyze the functions and operations of the system

  • Implement changes or improvements if necessary

Add your answer

Q184. Difference between tcp and udp

Ans.

TCP is connection-oriented, reliable, and slower, while UDP is connectionless, unreliable, and faster.

  • TCP is connection-oriented, meaning it establishes a connection before sending data, while UDP is connectionless.

  • TCP is reliable as it ensures all data is received in order and without errors, while UDP does not guarantee delivery.

  • TCP is slower due to the overhead of establishing and maintaining connections, while UDP is faster with lower latency.

  • Examples: TCP is used for web...read more

Add your answer

Q185. Different types of attacks

Ans.

Different types of attacks include phishing, malware, DDoS, and social engineering.

  • Phishing: fraudulent emails or websites to trick users into revealing sensitive information

  • Malware: malicious software designed to harm or exploit a computer system

  • DDoS: Distributed Denial of Service attacks overwhelm a system with traffic, causing it to crash

  • Social engineering: manipulating individuals into divulging confidential information

Add your answer

Q186. working flow of struts

Ans.

Struts is a framework for building Java web applications based on the Model-View-Controller (MVC) design pattern.

  • Struts framework is based on MVC architecture

  • It uses ActionServlet as the controller

  • Struts configuration is done using XML files like struts-config.xml

  • It provides built-in support for form validation and error handling

  • Struts actions are mapped to URLs in struts-config.xml

Add your answer

Q187. Diff between HANA and ECC

Ans.

HANA is an in-memory database platform while ECC is a traditional ERP system.

  • HANA is designed to handle large amounts of data in real-time while ECC is not optimized for real-time processing.

  • HANA uses column-based storage while ECC uses row-based storage.

  • HANA has a simpler data model and can handle unstructured data while ECC has a more complex data model.

  • HANA is a newer technology while ECC has been around for decades.

  • HANA is often used for analytics and reporting while ECC ...read more

Add your answer

Q188. Experience in Manufacturing

Add your answer

Q189. Explain project

Ans.

The project involves developing a training program for employees to enhance their skills and knowledge.

  • Identify training needs through assessments and feedback

  • Design training materials and modules

  • Deliver training sessions through various methods such as workshops, webinars, and on-the-job training

  • Evaluate training effectiveness through assessments and feedback

  • Adjust training program based on feedback and results

Add your answer
1
2
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Conneqt Business Solutions

based on 235 interviews
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.7
 • 3.1k Interview Questions
4.4
 • 435 Interview Questions
3.6
 • 197 Interview Questions
3.7
 • 150 Interview Questions
3.7
 • 144 Interview Questions
3.8
 • 139 Interview Questions
View all
Top Atos Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter