Add office photos
Engaged Employer

Capgemini

3.8
based on 40.1k Reviews
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

1000+ Rims Marketing Interview Questions and Answers

Updated 27 Jan 2025
Popular Designations

Q1. 1. What's the use of update sets and how do you move update set from one instance to another? Once you imported the update set, what will you do? To check the customisations, You need to do open the update set...

read more
Ans.

Interview questions for Senior Consultant role

  • Update sets are used to move customizations from one instance to another

  • To move multiple update sets at once, use the Update Set Migration plugin

  • Custom applications can be developed using ServiceNow's App Creator

  • Turnstile activity in workflow is used to loop back to a previous activity

  • Activities in workflows include approvals, notifications, and subflows

  • To copy fields from incident table to task record, use a UI action with script...read more

View 2 more answers

Q2. Could you tell me, which tools do you have used in test management and defect tracking?

Ans.

I have experience using JIRA and HP ALM for test management and defect tracking.

  • I have used JIRA extensively for managing test cases, test plans, and tracking defects.

  • I have also worked with HP ALM for test management and defect tracking.

  • Both tools have robust reporting capabilities that allow for easy tracking of project progress and defect resolution.

  • In addition, I have experience integrating these tools with other software development tools such as Jenkins and Git for cont...read more

View 8 more answers

Q3. 1) What are the types of master data in SAP MM? 2) What is T-code for creation of material master? 3) What are the types of document in SAP MM? 4) What is T- code for creation of vendor master? 5) What is STO?...

read more
Ans.

1) Material, Vendor, Customer, and Service master data are types of master data in SAP MM.

  • Material master data contains information about materials used in production or procurement.

  • Vendor master data contains information about the vendors or suppliers.

  • Customer master data contains information about the customers.

  • Service master data contains information about the services provided.

View 2 more answers

Q4. JCL 1. Ways in which the you can paas on data from.jcl to cobol.: Dsn file, sysin, parm 2.How do u accept the data which is paased from Parm parameter.: Using linkage section. 3. How will u make any step run in...

read more
Ans.

Interview questions for Senior Consultant position on JCL and DB2

  • JCL: passing data using DSN file, SYSIN, and PARM parameters

  • JCL: accepting data passed from PARM parameter using linkage section

  • JCL: making a step run in case of job failure using COND=ONLY

  • JCL: explaining DISP position

  • JCL: writing logic to copy matching data from two input files based on a common key

  • DB2: explaining cursor not defined for selecting more than one row from table

  • DB2: life cycle of cursor - declare, ...read more

Add your answer
Discover Rims Marketing interview dos and don'ts from real experiences

Q5. Split Array with Equal Sums Problem Statement

Given an array 'ARR' of size 'N', determine if there exists a triplet (i, j, k) satisfying the conditions: 0 < i , i + 1 < j , j + 1 < k and k < N - 1, such that th...read more

Add your answer

Q6. Non-Decreasing Array Problem Statement

Given an integer array ARR of size N, determine if it can be transformed into a non-decreasing array by modifying at most one element.

An array is defined as non-decreasin...read more

Add your answer
Are these interview questions helpful?

Q7. Majority Element III Problem Statement

You are given an array ARR and an integer K. Your task is to find all the elements in ARR that occur more than or equal to N/K times, where N is the length of the array AR...read more

Add your answer

Q8. 1). How pricing procedure is determine in SAP SD. 2). ASAP Methodology steps and your role as a SD Consultant. 3). GAPS during Implementation Project. 4). Condition technique for determining pricing procedure....

read more
Ans.

Questions related to SAP SD implementation and processes.

  • Pricing procedure is determined based on condition technique and can be customized as per business requirements.

  • ASAP methodology involves various phases like project preparation, business blueprint, realization, final preparation, and go-live and support.

  • GAPS during implementation project can arise due to differences between business requirements and system capabilities.

  • Condition technique involves defining access seque...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What type of testing you have done in your career and how many test cases written of the day?

Ans.

I have experience in functional, regression, integration, and acceptance testing. On average, I write 20-30 test cases per day.

  • Functional testing to ensure the software meets the requirements

  • Regression testing to ensure new changes do not break existing functionality

  • Integration testing to ensure different components work together

  • Acceptance testing to ensure the software meets the user's needs

  • On average, I write 20-30 test cases per day

  • Examples include testing a new feature on...read more

View 1 answer

Q10. What is agile fundamentals and theirs importance and waterfall model?

Ans.

Agile fundamentals are a set of principles and values that prioritize flexibility, collaboration, and continuous improvement in software development. Waterfall model is a traditional linear approach to software development.

  • Agile emphasizes iterative development and customer collaboration

  • Agile values individuals and interactions over processes and tools

  • Agile promotes responding to change over following a plan

  • Waterfall model follows a sequential approach to software development...read more

View 1 answer

Q11. What are the different file replication strategies in Azure blob storage ?

Ans.

Azure blob storage supports three file replication strategies: LRS, ZRS, and GRS.

  • LRS (Locally Redundant Storage) replicates data within a single data center.

  • ZRS (Zone Redundant Storage) replicates data across multiple data centers within a single region.

  • GRS (Geo-Redundant Storage) replicates data across multiple data centers in two separate regions for added redundancy.

  • Read-access geo-redundant storage (RA-GRS) provides read access to the data in the secondary region in case ...read more

Add your answer

Q12. Kth Largest Number Problem Statement

You are given a continuous stream of numbers, and the task is to determine the kth largest number at any moment during the stream.

Explanation:

A specialized data structure ...read more

Add your answer

Q13. What is workflow,trigger, different types of reports, roles, profiles, permission set, sharing rules etc?

Ans.

Workflow, trigger, reports, roles, profiles, permission set, and sharing rules are all important features in Salesforce.

  • Workflow is a series of automated steps that can be used to streamline business processes.

  • Triggers are used to execute code before or after a record is inserted, updated, or deleted.

  • Reports are used to display data in a visual format, such as a table or chart.

  • Roles are used to define the hierarchy of users in an organization.

  • Profiles are used to define the p...read more

Add your answer

Q14. Count Inversions Problem Statement

Given an integer array ARR of size N, your task is to find the total number of inversions that exist in the array.

An inversion is defined for a pair of integers in the array ...read more

Add your answer

Q15. How to handle addition of new module to service program ?

Ans.

Adding a new module to a service program requires careful planning and testing.

  • Identify the purpose and requirements of the new module

  • Determine the impact on existing modules and services

  • Create a detailed plan for implementation and testing

  • Perform thorough testing to ensure compatibility and functionality

  • Document the changes and update relevant documentation

  • Communicate the changes to stakeholders and users

Add your answer

Q16. How to achieve to different pricing procedure for sales order and billing document , which controls will enable thia

Ans.

To achieve different pricing procedures for sales order and billing document in SAP SD, you can use condition technique and pricing procedure determination.

  • Create separate pricing procedures for sales order and billing document

  • Assign the pricing procedures to respective document types

  • Configure condition technique to determine the pricing procedure based on document type

  • Use condition records and access sequences to define pricing conditions

  • Maintain condition records for each p...read more

View 5 more answers

Q17. Selenium 1. Locators 2. How to handle multiple windows 3 . Frame concept 4. Selenium grid Java: 1. Oops concepts 2. Java collection. 3. Difference b/w array arraylist, map hashmap 4 . Program to reverse string

Ans.

Interview questions on Selenium and Java concepts.

  • Selenium: 1. Locators - identify web elements using ID, name, class, etc. 2. Handling multiple windows - switchTo() method. 3. Frame concept - switchTo().frame(). 4. Selenium grid - distribute tests across multiple machines.

  • Java: 1. Oops concepts - inheritance, polymorphism, encapsulation, abstraction. 2. Java collection - List, Set, Map. 3. Difference between array, ArrayList, Map, HashMap. 4. Program to reverse string - use ...read more

Add your answer

Q18. what are the different Azure PaaS components i had worked with?

Ans.

I have worked with various Azure PaaS components including Azure Functions, Azure App Service, Azure Logic Apps, and Azure Event Grid.

  • Azure Functions - serverless compute service for building event-driven applications

  • Azure App Service - platform for building and deploying web and mobile apps

  • Azure Logic Apps - workflow automation service for integrating apps, data, and services

  • Azure Event Grid - event routing service for subscribing to and processing events

Add your answer

Q19. Can you tell how to trigger Authorizations in any simulator and explain them

Ans.

Authorizations can be triggered in simulators by following specific steps and commands.

  • In simulators, authorizations can be triggered by sending specific commands or requests to simulate the authorization process.

  • These commands typically involve providing necessary credentials, permissions, and access rights to trigger the authorization flow.

  • For example, in a network simulator, triggering authorizations may involve sending authentication requests with valid credentials to sim...read more

View 1 answer

Q20. What firewalls are you worked on? What are UTM firewalls? What is stateless and stateful inspection?

Ans.

Firewalls are network security devices that monitor and control incoming and outgoing network traffic. UTM firewalls provide additional security features such as antivirus, intrusion prevention, and content filtering. Stateless inspection examines each packet individually, while stateful inspection tracks the state of connections between packets.

  • Firewalls monitor and control network traffic

  • UTM firewalls provide additional security features

  • Stateless inspection examines each pa...read more

Add your answer

Q21. Next Greater Element Problem Statement

Given a list of integers of size N, your task is to determine the Next Greater Element (NGE) for every element. The Next Greater Element for an element X is the first elem...read more

Add your answer

Q22. Kth Largest Element Problem Statement

Ninja enjoys working with numbers, and Alice challenges him to find the Kth largest value from a given list of numbers.

Input:

The first line contains an integer 'T', repre...read more
Add your answer

Q23. Find Duplicates in an Array

You are given an array/list ARR consisting of N integers, where each element is in the range 0 to N - 1. Your task is to identify all duplicate elements present in ARR.

Input:

The fi...read more
Add your answer

Q24. What is your favorite programming language?

Ans.

My favorite programming language is Python.

  • Python is easy to learn and has a simple syntax.

  • It has a vast library of modules and frameworks for various purposes.

  • Python is widely used in data science and machine learning.

  • It is also great for web development, automation, and scripting.

  • Some popular companies that use Python include Google, Facebook, and Netflix.

View 2 more answers

Q25. How to manipulate traffic in OSPF? How to link indirectly connected areas to backbone area? What are OSPF LSAs?

Ans.

OSPF traffic manipulation and linking indirectly connected areas to backbone area using LSAs.

  • OSPF traffic can be manipulated using various methods such as adjusting the cost metric or using route redistribution.

  • To link indirectly connected areas to the backbone area, a virtual link can be created through a transit area.

  • OSPF LSAs (Link State Advertisements) are packets that contain information about the network topology and are used by OSPF routers to build a complete map of t...read more

Add your answer

Q26. Is Java platform-independent, if yes why?

Ans.

Yes, Java is platform-independent because of its 'write once, run anywhere' principle.

  • Java programs are compiled into bytecode, which can be executed on any platform with a Java Virtual Machine (JVM).

  • The JVM acts as an interpreter, translating the bytecode into machine code specific to the underlying platform.

  • This allows Java programs to run on different operating systems and hardware architectures without modification.

  • For example, a Java program developed on a Windows machin...read more

View 5 more answers

Q27. How much you give the star out of 5?

Ans.

I cannot give a star rating without knowing the specific context or criteria being evaluated.

  • I would need more information about what is being rated to give an accurate star rating.

  • It would be helpful to know the specific criteria or standards being used to evaluate the subject.

  • Without context, a star rating would be arbitrary and meaningless.

  • For example, if we are discussing a restaurant, I would need to know about the quality of the food, service, atmosphere, etc. before gi...read more

View 1 answer

Q28. Difference between storage queue, Service bus queue, event hub, IOT hub and event grid, when to use which one explain with scenario?

Ans.

Storage Queue, Service Bus Queue, Event Hub, IoT Hub, and Event Grid are different messaging services in Azure.

  • Storage Queue is a simple message queue for reliable messaging between components within an application.

  • Service Bus Queue is a fully-featured messaging service for decoupling applications and enabling reliable communication.

  • Event Hub is a big data streaming platform for ingesting and processing large volumes of events in real-time.

  • IoT Hub is a managed service for bid...read more

Add your answer

Q29. Find All Pairs Adding Up to Target

Given an array of integers ARR of length N and an integer Target, your task is to return all pairs of elements such that they add up to the Target.

Input:

The first line conta...read more
Add your answer

Q30. what are the different types of datatypes in python?

Ans.

Python has several built-in datatypes including numeric, sequence, and mapping types.

  • Numeric types include integers, floating-point numbers, and complex numbers.

  • Sequence types include lists, tuples, and range objects.

  • Mapping types include dictionaries.

  • Other datatypes include boolean, bytes, and sets.

View 1 answer

Q31. If a computer speed is slow, how will you increase its speed?

Ans.

To increase computer speed, optimize startup programs, remove malware, upgrade hardware, and clear disk space.

  • Optimize startup programs to reduce the number of programs running at startup

  • Remove malware using antivirus software

  • Upgrade hardware such as RAM or SSD

  • Clear disk space by deleting unnecessary files and programs

  • Disable visual effects to improve performance

View 2 more answers

Q32. Why are these three called as pillars of scrum ? How are they related to each other

Ans.

The three pillars of Scrum are transparency, inspection, and adaptation. They are interrelated and support the Scrum framework.

  • Transparency ensures that all information is visible and accessible to the team, stakeholders, and customers.

  • Inspection involves regularly reviewing the progress, artifacts, and processes to identify any deviations or issues.

  • Adaptation refers to making necessary changes based on the inspection results to improve the product and the process.

  • These pilla...read more

View 3 more answers

Q33. If create 10 rest api and deploy it on server and create same 10rest api using jar package then which one is lighter and faster?

Ans.

The REST API deployed on the server is lighter and faster than the one created using jar package.

  • REST API is designed to be lightweight and efficient.

  • JAR packages are typically larger and require more resources to run.

  • Deploying REST API on a server allows for better scalability and performance.

  • JAR packages may be useful for certain use cases, such as offline applications or embedded systems.

Add your answer

Q34. Project &amp; skills in which u worked,what is spi testing,what all tools you know,rest api,apart from spi sny other skills in which u hv gd experience

Ans.

SPI testing is a type of software testing that focuses on measuring the performance of a system or application.

  • SPI testing involves measuring the performance of a system or application against predefined metrics.

  • Tools commonly used for SPI testing include JMeter, LoadRunner, and Gatling.

  • REST API testing involves testing the functionality and performance of RESTful web services.

  • Other skills I have experience in include test automation, agile methodologies, and defect tracking ...read more

Add your answer

Q35. From start to end how you perform web application penetration testing on a website with firewall is enabled on it?

Ans.

Performing web application penetration testing on a website with firewall enabled.

  • Identify the type of firewall and its configuration

  • Perform reconnaissance to gather information about the target

  • Identify vulnerabilities and exploit them

  • Use tools like Burp Suite, Nmap, and Metasploit

  • Test for common web application vulnerabilities like SQL injection and cross-site scripting

  • Document findings and provide recommendations for remediation

Add your answer

Q36. Have you worked on BGP? What are the attributes? How to manipulate traffic using attributes?

Ans.

BGP is a routing protocol used in large networks. It has attributes that can be manipulated to control traffic flow.

  • BGP attributes include AS path, next hop, local preference, and MED.

  • AS path is used to prevent loops and determine the shortest path.

  • Next hop is used to determine the next router to send traffic to.

  • Local preference is used to determine the preferred path for outbound traffic.

  • MED is used to influence the path for inbound traffic.

  • Traffic can be manipulated by chan...read more

Add your answer

Q37. Count Good Subsets Problem Statement

Given an array ARR of size N consisting of distinct elements, your task is to determine the total number of good subsets. A subset is considered a good subset if the element...read more

Add your answer

Q38. What is your favorite language other than programming language?

Ans.

My favorite language other than programming language is French.

  • I love the sound of the language and its rich culture.

  • I enjoy reading French literature and watching French films.

  • I have traveled to France and appreciate the beauty of the country.

  • I also appreciate the practicality of knowing a widely spoken language.

  • For example, it has helped me communicate with French-speaking colleagues and clients.

Add your answer
Q39. How can you print the number of records available in a table?
Add your answer

Q40. angular Components Directives Interceptor How do u show spinner from interceptor Reactive forms Use of authguards Hostlistener Component communication Dependency injection Optional chaining Responsive web desig...

read more
Ans.

Questions on Angular, JavaScript, and CSS

  • Angular components, directives, and interceptors

  • Showing spinner from interceptor

  • Reactive forms and authguards

  • Hostlistener and component communication

  • Dependency injection and optional chaining

  • JavaScript async, defer, cloning objects, hoisting, spread operator, comparing objects, event bubbling, and prototype

  • CSS box model

Add your answer

Q41. How to implement monitoring with open source monitoring tools. How to expose and visualise metrics.

Ans.

Open source monitoring tools can be used to implement monitoring and visualize metrics.

  • Choose a suitable open source monitoring tool such as Nagios, Zabbix, or Prometheus.

  • Install and configure the monitoring tool to collect data from the desired sources.

  • Define the metrics to be monitored and set up alerts for critical events.

  • Use a visualization tool such as Grafana to create dashboards and display the collected metrics.

  • Ensure that the monitoring system is scalable and can han...read more

Add your answer

Q42. How did i identify the problem statement?

Ans.

I identified the problem statement by analyzing the client's needs and pain points.

  • Conducted interviews with stakeholders

  • Reviewed data and reports

  • Identified patterns and trends

  • Considered industry best practices

  • Developed a clear problem statement

  • Example: Client needs to increase sales revenue by 20% within the next quarter

Add your answer

Q43. TI - What are CDMA and TDMA? What do you mean by a MUX?

Ans.

CDMA and TDMA are wireless communication technologies. MUX stands for Multiplexer.

  • CDMA stands for Code Division Multiple Access and TDMA stands for Time Division Multiple Access.

  • CDMA allows multiple users to share the same frequency band by assigning unique codes to each user.

  • TDMA divides a frequency band into time slots and each user is assigned a specific time slot.

  • A MUX is a device that combines multiple signals into a single signal for transmission over a single channel.

  • M...read more

Add your answer

Q44. Have you worked upon static routing? How do you increase AD in static routing?

Ans.

Yes, I have worked on static routing. AD can be increased by changing the administrative distance value.

  • Static routing is a type of routing where the routes are manually configured by the network administrator.

  • Administrative distance (AD) is a value assigned to a routing protocol or static route to indicate its trustworthiness.

  • To increase AD in static routing, we can change the administrative distance value to a higher number.

  • For example, if the current AD value is 1, we can ...read more

Add your answer

Q45. Explain how to design azure architecture using VM, VNet and Load Balancers?

Ans.

Designing Azure architecture using VM, VNet, and Load Balancers involves creating virtual machines, virtual networks, and load balancers to ensure scalability, availability, and performance.

  • Start by creating a virtual network (VNet) to establish a private network in Azure.

  • Create virtual machines (VMs) within the VNet to host your applications and services.

  • Configure load balancers to distribute incoming traffic across multiple VMs for high availability and scalability.

  • Use Azur...read more

Add your answer

Q46. How can two systems communicate in different vlan over a switch?

Ans.

Two systems in different VLANs can communicate through a router or layer 3 switch.

  • A router or layer 3 switch is required to route traffic between VLANs

  • Each system must have a unique IP address within their respective VLANs

  • The router or layer 3 switch must have interfaces configured for each VLAN

  • The router or layer 3 switch must have a routing table that includes both VLANs

  • Firewall rules may need to be configured to allow traffic between VLANs

Add your answer

Q47. What are the Challenges that you face while migrating reports from one environment to another.

Ans.

Challenges faced while migrating reports from one environment to another

  • Compatibility issues between the old and new environments

  • Data source connections may need to be updated

  • Formatting and layout may need to be adjusted

  • Security settings may need to be reconfigured

  • Testing and validation of migrated reports is crucial

  • User training may be required for any changes in functionality

Add your answer

Q48. What is Transaction/sec, hits/sec, 90 Percentile etc?

Ans.

Transaction/sec, hits/sec, and 90th percentile are performance metrics used to measure the efficiency of a system.

  • Transaction/sec measures the number of transactions processed per second.

  • Hits/sec measures the number of requests received by a server per second.

  • 90th percentile is a measure of the response time of a system, indicating the time taken for 90% of requests to be completed.

  • These metrics are important in evaluating the performance of a system and identifying areas for...read more

Add your answer

Q49. What are the different types of Fact and Dimension tables?

Ans.

Fact tables store quantitative data while dimension tables store descriptive data.

  • Types of fact tables: transactional, periodic snapshot, accumulating snapshot

  • Types of dimension tables: conformed, junk, degenerate, slowly changing

  • Examples: sales fact table, time dimension table, product dimension table

  • Fact tables are linked to dimension tables through foreign keys

Add your answer

Q50. how many ways to insert bulk record in sql

Ans.

There are multiple ways to insert bulk records in SQL, such as using INSERT INTO, BULK INSERT, or SQL Server Integration Services (SSIS).

  • Use INSERT INTO statement with multiple value sets in a single query

  • Use BULK INSERT statement to insert data from a file into a table

  • Use SQL Server Integration Services (SSIS) for more complex data import and transformation tasks

Add your answer

Q51. how to upload large volume of file in application

Ans.

Use a file transfer protocol like FTP or a cloud storage service to upload large volumes of files.

  • Consider using a file transfer protocol like FTP for faster and more reliable uploads.

  • Utilize a cloud storage service like Google Drive or Dropbox for easy access and sharing of large files.

  • Break down large files into smaller chunks to upload them more efficiently.

  • Optimize file formats and compression techniques to reduce file size before uploading.

Add your answer

Q52. What is Dispatch? How to enable voice for Chatbot, Integration of Bot with web application, How are the insights captured for the chatbot

Ans.

Dispatch is a process of assigning tasks to appropriate resources. Voice for chatbot can be enabled using text-to-speech technology. Chatbot can be integrated with web application using APIs. Insights for chatbot can be captured using analytics tools.

  • Dispatch is a process of assigning tasks to appropriate resources

  • Voice for chatbot can be enabled using text-to-speech technology

  • Chatbot can be integrated with web application using APIs

  • Insights for chatbot can be captured using ...read more

Add your answer

Q53. Explain Load balancing in details / types / routing methods / Ports etc Docker commands and questions from the sample docker file K8 master node components and its usages Pods troubleshooting Diff types of comp...

read more
Ans.

Load balancing distributes incoming network traffic across multiple servers to ensure no single server is overwhelmed.

  • Types of load balancing: round robin, least connections, IP hash, weighted round robin, etc.

  • Routing methods: DNS-based, hardware-based, software-based, etc.

  • Ports: Load balancers can operate at Layer 4 (TCP/UDP) or Layer 7 (HTTP/HTTPS).

  • Docker commands: docker run, docker build, docker exec, etc.

  • K8 master node components: API server, scheduler, controller manage...read more

Add your answer

Q54. How many objects will create when string created using New keyword ?

Ans.

One object will be created when string created using New keyword.

  • When a string is created using the New keyword, only one object is created.

  • This object is stored in the heap memory.

  • The string object created using the New keyword is mutable.

  • The string object created using the New keyword can be modified.

  • The string object created using the New keyword is slower than the string literal.

Add your answer

Q55. Why Notify, wait, NotifyAll methods are part of Object class ?

Ans.

Notify, wait, NotifyAll methods are part of Object class for thread synchronization.

  • Object class is the root of all classes in Java.

  • These methods are used for inter-thread communication and synchronization.

  • Notify wakes up a single thread waiting on the object, while NotifyAll wakes up all threads.

  • Wait method causes the current thread to wait until another thread notifies it.

  • These methods are used in multi-threaded programming to avoid race conditions and deadlocks.

Add your answer

Q56. How to configure HSRP and VRRP? What are their differences? Have you worked on GLBP?

Ans.

HSRP and VRRP are protocols used to provide redundancy for IP addresses. GLBP is another protocol that provides load balancing.

  • HSRP and VRRP are used to provide redundancy for default gateways in a network.

  • HSRP is Cisco proprietary while VRRP is an open standard.

  • HSRP uses a virtual IP address while VRRP uses a virtual router ID.

  • GLBP is a Cisco proprietary protocol that provides load balancing between multiple gateways.

  • GLBP uses a virtual IP address and virtual MAC address to ...read more

Add your answer

Q57. How spanning tree will work in given topology? Have you worked on spanning tree manipulation?

Ans.

Spanning tree protocol prevents loops in a network by disabling redundant links.

  • Spanning tree protocol selects a root bridge and disables all other paths to prevent loops.

  • It uses a cost metric to determine the shortest path to the root bridge.

  • STP manipulation involves changing the cost metric to influence the path selection.

  • Examples of STP manipulation include changing port priorities or enabling portfast.

  • STP can be visualized using tools like Wireshark or Cisco's Packet Trac...read more

Add your answer

Q58. Where do you transfer the profit you get in P&amp;L a/c?

Ans.

The profit in the P&L a/c is transferred to the retained earnings account.

  • Profit is transferred to the retained earnings account to reflect the accumulated profits of the company.

  • Retained earnings account is a part of the equity section on the balance sheet.

  • The transfer is done at the end of the accounting period.

  • Retained earnings can be used for reinvestment, dividends, or other purposes.

  • Example: If a company has a profit of $100,000 in the P&L a/c, it will be transferred to...read more

View 3 more answers

Q59. how do you concatenate a string and integer? is it possible ?

Ans.

Yes, it is possible to concatenate a string and integer using type conversion.

  • Convert the integer to a string using str() function and then concatenate with the string.

  • Use format() method to insert the integer value into the string.

  • Use f-strings to directly insert the integer value into the string.

Add your answer

Q60. what is xpath ? How do you find an element ? what is the difference between absolute xpath and relative xpath?

Ans.

XPath is a language used to locate elements in an XML or HTML document. Absolute and relative XPaths differ in their starting point.

  • XPath is used to navigate through elements and attributes in an XML or HTML document

  • Elements can be located using absolute or relative XPaths

  • Absolute XPaths start from the root node and are more specific but less flexible

  • Relative XPaths start from the current node and are more flexible but less specific

Add your answer

Q61. How to correlate using JMeter and LoadRunner?

Ans.

Correlating in JMeter and LoadRunner

  • Identify the dynamic parameters in the script

  • Use correlation functions to extract and replace dynamic values

  • Verify the correlation using debuggers and log files

  • JMeter uses Regular Expression Extractor and LoadRunner uses web_reg_save_param

  • Correlation can improve script accuracy and reduce errors

Add your answer

Q62. if some data is not found on the page, do page refresh and how do you validate a data after page refresh in selenium?

Ans.

To validate data after page refresh in Selenium, we can refresh the page and then use explicit wait to validate the data.

  • Refresh the page using driver.navigate().refresh() method

  • Use explicit wait to wait for the element to be visible on the page

  • Validate the data using getText() or getAttribute() method

  • Example: driver.navigate().refresh(); WebDriverWait wait = new WebDriverWait(driver, 10); wait.until(ExpectedConditions.visibilityOfElementLocated(By.xpath("xpath_of_element")))...read more

Add your answer

Q63. How to declare membered file in rpgle program ?

Ans.

To declare membered file in rpgle program, use the DCL-F statement followed by the file name and member name separated by a slash.

  • Use the DCL-F statement to declare the file

  • Separate the file name and member name with a slash (/)

  • Example: DCL-F MYFILE/MYMEMBER

  • The membered file must be created beforehand using CRTSRCPF command

Add your answer

Q64. What is the benefit of Partitioning and bucketing ?

Ans.

Partitioning and bucketing improves query performance by reducing data scanned and optimizing data distribution.

  • Partitioning divides data into smaller, manageable chunks based on a specific column. This reduces the amount of data scanned during queries.

  • Bucketing further optimizes data distribution by dividing partitions into smaller, equally sized buckets based on another column. This improves query performance by reducing data shuffling.

  • For example, partitioning by date can ...read more

Add your answer

Q65. What are the different types of events in lightning

Ans.

Different types of events in lightning include component events, application events, and system events.

  • Component events are fired by components and can be handled by the component itself or its parent components.

  • Application events are fired by one component and can be handled by any other component in the application.

  • System events are fired by the framework itself, such as when a component is rendered or destroyed.

Add your answer

Q66. What is the difference between velocity and capacity?

Ans.

Velocity is the amount of work completed in a sprint, while capacity is the amount of work a team can handle in a sprint.

  • Velocity is a measure of the team's productivity in completing user stories or tasks in a sprint.

  • Capacity is the amount of work a team can handle in a sprint, taking into account factors such as team size, availability, and skill level.

  • Velocity is calculated by dividing the total number of story points completed in a sprint by the length of the sprint in da...read more

View 3 more answers

Q67. What model your following in testing like agile or waterfall?? Explain in detail??

Ans.

We follow the Agile model in testing.

  • We prioritize customer satisfaction through continuous delivery and feedback.

  • We work in short sprints, delivering working software at the end of each sprint.

  • We collaborate closely with developers and stakeholders throughout the process.

  • We embrace change and adapt to evolving requirements.

  • We use tools like JIRA and Confluence to manage our Agile process.

Add your answer

Q68. SDLC vs STLC? write test cases? explain ur project and framework? so many questions on framework regarding? how to report bug? what is agile scrum?

Ans.

Questions on SDLC, STLC, test cases, project framework, bug reporting, and Agile Scrum.

  • SDLC (Software Development Life Cycle) is the process of developing software from planning to deployment.

  • STLC (Software Testing Life Cycle) is the process of testing software from planning to deployment.

  • Test cases are written to ensure that software meets the requirements and functions as expected.

  • Project framework refers to the structure and organization of a project, including tools and p...read more

Add your answer

Q69. Kernel files are existing in which location &amp; what are they

Ans.

Kernel files are located in /usr/sap//SYS/exe//

  • Kernel files are the core components of the SAP system

  • They are responsible for managing system resources and executing processes

  • Kernel files are platform-specific and are stored in the /usr/sap//SYS/exe// directory

  • Examples of kernel files include disp+work, icman, and msg_server

View 2 more answers

Q70. What Materialized view and where it can be implemented?

Ans.

Materialized view is a database object that contains the results of a query.

  • Materialized view is implemented in databases like Oracle, PostgreSQL, MySQL, etc.

  • It can be used to improve query performance by precomputing expensive joins and aggregations.

  • Materialized view can be refreshed manually or automatically based on a schedule or trigger.

  • Example: A materialized view can be created to store the total sales of a product by region.

  • Example: Materialized view can be used to spe...read more

Add your answer

Q71. What are azure PaaS Services, explain with examples?

Ans.

Azure PaaS services are cloud-based services that allow developers to build, deploy, and manage applications without having to manage the underlying infrastructure.

  • Examples include Azure App Service, Azure Functions, Azure SQL Database, Azure Cosmos DB, and Azure Event Grid.

  • Azure App Service allows developers to build and deploy web and mobile apps.

  • Azure Functions is a serverless compute service that allows developers to run code on-demand without having to manage servers.

  • Azu...read more

Add your answer

Q72. How can we find out a character string in a file using sort

Ans.

You can use the sort command with the grep utility to find a character string in a file.

  • Use the sort command to sort the lines of the file alphabetically or numerically.

  • Pipe the output of the sort command to the grep utility with the desired character string as the search pattern.

  • For example, to find the string 'hello' in a file named 'example.txt', you can use the command 'sort example.txt | grep hello'.

View 1 answer

Q73. How do you manage access of an Azure SQL db ?

Ans.

Access to Azure SQL db is managed through various methods.

  • Azure Active Directory authentication

  • SQL authentication

  • Firewall rules

  • Virtual network service endpoints

  • Role-based access control

  • Auditing and monitoring

  • Encryption

  • Regular review of access permissions

Add your answer

Q74. what is poker ? and why do you use fibonacci series to give story points ?

Ans.

Poker is an estimation technique used in Agile project management. Fibonacci series is used for story points to reflect uncertainty.

  • Poker is a collaborative estimation technique where team members assign story points to user stories.

  • It helps in determining the effort required to complete a user story.

  • Fibonacci series (0, 1, 2, 3, 5, 8, 13, etc.) is used to reflect the uncertainty and complexity of the work.

  • Larger numbers in the Fibonacci series indicate higher uncertainty and...read more

View 2 more answers

Q75. 1.What is Jenkins and Bitbucket ? what is maker and checker ? 2.What is difference between delete and Truncate ?

Ans.

Jenkins is an open-source automation server, and Bitbucket is a web-based version control repository. Maker and checker are roles in a review process.

  • Jenkins is used for continuous integration and delivery of software projects.

  • Bitbucket is a platform for hosting and managing Git repositories.

  • Maker and checker are roles in a review process where the maker creates a document or change, and the checker verifies and approves it.

  • The maker is responsible for creating or initiating ...read more

Add your answer

Q76. What is parameterized mapping ? How did you implement ?

Ans.

Parameterized mapping is a feature in SAP PI that allows dynamic mapping based on input parameters.

  • Parameterized mapping enables the mapping of different source and target structures based on input parameters

  • It allows for flexible and reusable mappings by using parameters to determine the mapping logic

  • Parameters can be defined and passed at runtime to dynamically determine the mapping behavior

  • Implementation involves defining parameters in the mapping program and using them in...read more

View 1 answer

Q77. What is assertion? What is soft assertion? What is hard assertion?

Ans.

Assertion is a validation point to check if the expected result matches the actual result. Soft assertion doesn't stop the test execution on failure, while hard assertion does.

  • Assertion is a way to validate if the expected result matches the actual result

  • Soft assertion doesn't stop the test execution on failure, but logs the failure and continues with the test

  • Hard assertion stops the test execution on failure and marks the test as failed

  • Example of soft assertion: verifying mu...read more

Add your answer

Q78. What is severity and priority?

Ans.

Severity and priority are terms used in issue management to indicate the impact and urgency of an issue.

  • Severity refers to the degree of impact an issue has on the system or business.

  • Priority refers to the urgency with which an issue needs to be addressed.

  • Issues with high severity and high priority should be addressed immediately.

  • Examples of high severity issues include system crashes or data loss.

  • Examples of high priority issues include critical business processes being affe...read more

View 1 answer

Q79. What are the pillars of Scrum ?

Ans.

The pillars of Scrum are transparency, inspection, and adaptation.

  • Transparency: All information about the project must be visible and understandable to everyone involved.

  • Inspection: Regularly inspect the progress and the product to identify any deviations or issues.

  • Adaptation: Based on the inspection, make necessary changes and adjustments to improve the product and the process.

View 7 more answers

Q80. a. Liquidity risk definition, concept b. Derivatives (in detail) c. Liquidity risk reporting (LCR , NSFR) d. User story vs Use-case e. Scrum Meeting types

Ans.

Questions on liquidity risk, derivatives, user stories, and Scrum meetings for Senior Consultant role.

  • Liquidity risk refers to the risk of not being able to meet financial obligations due to lack of cash or liquid assets.

  • Derivatives are financial instruments whose value is derived from an underlying asset or security.

  • Liquidity risk reporting includes the Liquidity Coverage Ratio (LCR) and Net Stable Funding Ratio (NSFR).

  • User stories are short, simple descriptions of a feature...read more

Add your answer

Q81. why react js, functional comp vs class comp refs hoc redux fetch API lazy load Javascript Array output questions

Ans.

React JS is a popular JavaScript library for building user interfaces.

  • Functional components are simpler and more lightweight than class components.

  • Refs are used to access DOM nodes or React elements created in the render method.

  • Higher Order Components (HOC) are functions that take a component and return a new component with additional functionality.

  • Redux is a state management library for React applications.

  • Fetch API is used to make network requests in JavaScript.

  • Lazy loading ...read more

Add your answer

Q82. how do you generate random emails in python? gmail.com is constant

Ans.

Generating random emails in Python with constant domain

  • Use the random module to generate random strings for the username part of the email

  • Combine the random username with the constant domain name

  • Ensure the generated email is unique if required

View 1 answer

Q83. What ia the difference between plant and plant out side the countey

Ans.

Plant outside the country refers to a plant location that is situated outside the country where the company is headquartered.

  • Plant refers to a physical location where materials are produced or stored.

  • Plant outside the country is a plant location situated outside the country where the company is headquartered.

  • Plant outside the country may have different legal requirements and regulations compared to the plants within the country.

  • Plant outside the country may have different cur...read more

Add your answer

Q84. What are different types of cloud?

Ans.

There are three types of cloud: public, private, and hybrid.

  • Public cloud: services offered to anyone on the internet, e.g. AWS, Azure

  • Private cloud: services offered within a private network, e.g. OpenStack

  • Hybrid cloud: combination of public and private cloud, e.g. Google Cloud Platform

Add your answer

Q85. How to find duplicate Words from String ?

Ans.

To find duplicate words from a string, we can split the string into words and use a hash table to keep track of the frequency of each word.

  • Split the string into words using a delimiter like space or punctuation.

  • Create a hash table to store the frequency of each word.

  • Iterate through each word and check if it already exists in the hash table.

  • If it does, increment the frequency count. If not, add it to the hash table with a frequency of 1.

  • Return the list of words with a frequenc...read more

Add your answer

Q86. Angular multiple ways to communicate with component

Ans.

Angular components can communicate with each other using @Input, @Output, EventEmitter, services, and RxJS observables.

  • Using @Input decorator to pass data from parent to child component

  • Using @Output decorator and EventEmitter to emit events from child to parent component

  • Using services to share data between components

  • Using RxJS observables to create a data stream that can be subscribed to by multiple components

Add your answer

Q87. how do you achieve synchronization? what are the differences between the synchronization ways?

Ans.

Synchronization is the process of coordinating the execution of multiple threads to ensure proper order of execution.

  • Synchronization can be achieved using techniques like locks, semaphores, and monitors.

  • Locks are used to ensure that only one thread can access a shared resource at a time.

  • Semaphores are used to control access to a shared resource by limiting the number of threads that can access it at once.

  • Monitors are used to ensure that only one thread can execute a critical ...read more

Add your answer

Q88. reverse a string,write code to find prime number

Ans.

Reverse a string and find prime numbers in code.

  • To reverse a string, iterate through the characters and append them in reverse order.

  • To find prime numbers, iterate from 2 to the square root of the number and check for divisibility.

Add your answer

Q89. Q1. You don't have experience on kubernetes. Tell me 2 reason that would convince me to select on the basis of your knowledge. Q2. Steps to deploy kubernetes. Q3. Suddenly master node fails, what will be your a...

read more
Ans.

Answering questions related to Technical Lead interview

  • I have experience in containerization and orchestration tools like Docker and Swarm, which will help me quickly learn and adapt to Kubernetes

  • I have a strong understanding of distributed systems and cloud infrastructure, which are key components of Kubernetes architecture

  • Steps to deploy Kubernetes involve setting up a cluster, configuring nodes, installing Kubernetes components, and deploying applications using YAML files

  • I...read more

Add your answer

Q90. How will you rate yourself on the tools like Power BI, Python, Tableau

Ans.

I rate myself highly on Power BI and Tableau, but have limited experience with Python.

  • I have extensive experience using Power BI and Tableau to create interactive dashboards and reports.

  • I have limited experience with Python, but am eager to learn and expand my skillset.

  • I am comfortable working with data and have a strong understanding of data visualization best practices.

Add your answer

Q91. What types of load balancing have you configured?

Ans.

I have configured various types of load balancing including round-robin, least connections, and IP hash.

  • Round-robin distributes traffic evenly among servers

  • Least connections sends traffic to the server with the fewest active connections

  • IP hash uses the client's IP address to determine which server to send traffic to

Add your answer

Q92. If customer make payments then can we manually adjust through any screen

Ans.

Yes, we can manually adjust payments through the appropriate screen.

  • Adjustments can be made through the payment screen

  • Manual adjustments require appropriate permissions

  • Examples of adjustments include applying discounts or correcting errors

Add your answer

Q93. Write a code to print 100 prime numbers on a paper.

Ans.

Code to print 100 prime numbers on paper.

  • Create a function to check if a number is prime

  • Loop through numbers until 100 primes are found

  • Print each prime number on paper

Add your answer

Q94. Why is Palo Alto called as Next Generation Firewall?

Ans.

Palo Alto is called Next Generation Firewall due to its advanced security features and capabilities.

  • Palo Alto offers application awareness and control, which allows it to identify and block threats that traditional firewalls cannot.

  • It uses machine learning and artificial intelligence to detect and prevent advanced threats.

  • Palo Alto provides visibility into network traffic and can enforce security policies based on user and device identity.

  • It offers integrated threat intellige...read more

Add your answer

Q95. What are the pointers and why java won't allow pointers?

Ans.

Pointers are variables that store memory addresses. Java doesn't allow pointers for security and simplicity reasons.

  • Pointers are variables that store memory addresses

  • Java doesn't allow pointers for security reasons

  • Java uses references instead of pointers

Add your answer

Q96. What is the full lifecycle Major Incident Management(MIM)?

Ans.

The full lifecycle of Major Incident Management involves identification, categorization, prioritization, diagnosis, resolution, and closure of major incidents.

  • Identification of major incidents

  • Categorization and prioritization based on impact and urgency

  • Diagnosis to determine root cause

  • Resolution through appropriate actions

  • Closure with post-incident review and documentation

Add your answer

Q97. How computer connects to internet and how to solve if not getting connected?

Ans.

A computer connects to the internet through a modem or router. Troubleshoot by checking connections and resetting devices.

  • A computer can connect to the internet through a wired or wireless connection

  • A modem or router is required to connect to the internet

  • Check if the modem or router is properly connected and turned on

  • Reset the modem or router if necessary

  • Check network settings on the computer

  • Try restarting the computer or device

  • Contact internet service provider for further as...read more

Add your answer

Q98. How Concurrent HashMap works Internally ?

Ans.

Concurrent HashMap allows multiple threads to access and modify the map concurrently.

  • It uses a technique called lock striping to divide the map into segments and apply locks to each segment.

  • Each segment can be accessed and modified independently by different threads.

  • It uses a combination of volatile and CAS (Compare-And-Swap) operations to ensure thread-safety.

  • It provides better performance than synchronized HashMap in multi-threaded environments.

  • Example: ConcurrentHashMap in...read more

Add your answer

Q99. What are different types of depency injection? What are exceptions Java 8 stream api

Ans.

Different types of dependency injection, exceptions, and Java 8 stream API.

  • Types of dependency injection: constructor injection, setter injection, and interface injection.

  • Exceptions are errors that occur during program execution and can be handled using try-catch blocks.

  • Java 8 stream API provides a functional approach to processing collections and supports operations like filter, map, reduce, etc.

Add your answer

Q100. What happens in the background when the spring application starts?

Ans.

During Spring application startup, several processes occur in the background.

  • Spring container is initialized

  • Bean definitions are loaded and instantiated

  • Dependency injection is performed

  • Application context is created

  • Auto-configuration classes are processed

  • Application events are published

  • Web server is started (if applicable)

Add your answer
1
2
3
4
5
6
7
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos
Top Capgemini Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter