Add office photos
Deloitte logo
Premium Employer

Deloitte

Verified
3.8
based on 17.9k Reviews
Video summary
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
Clear (1)

100+ Deloitte Interview Questions and Answers for Freshers

Updated 24 Feb 2025
Popular Designations

Q1. Guesstimate: ‘How much would a tea seller earn in a year by selling a tea on the roadside joint in Mumbai’

Ans.

The tea seller in a roadside joint in Mumbai can earn an average annual income of around INR 2,40,000.

  • The average price of a cup of tea in Mumbai is around INR 10.

  • Assuming the tea seller sells 100 cups of tea per day, the daily revenue would be INR 1,000.

  • Considering the tea seller operates 300 days a year, the annual revenue would be INR 3,00,000.

  • After deducting expenses like rent, ingredients, and wages, the tea seller's net income could be around INR 2,40,000.

View 1 answer
right arrow

Q2. What if you have unlimited budget but only two areas to spend on where will you spend?

Ans.

Invest in research and development and employee training.

  • Invest in research and development to drive innovation and stay ahead of competitors.

  • Allocate funds for employee training and development to enhance skills and expertise.

  • Examples: Setting up state-of-the-art R&D facilities, hiring top researchers, conducting market research, organizing training programs and workshops.

View 3 more answers
right arrow

Q3. Can we debug AMDP and CDS?

Ans.

Yes, we can debug AMDP and CDS.

  • We can debug AMDP using ABAP debugger or Eclipse debugger.

  • We can debug CDS using Eclipse debugger or SQL Trace.

  • For AMDP, we can set breakpoints in the method and debug it.

  • For CDS, we can use SQL Trace to analyze the SQL statements generated by CDS view.

  • Debugging helps in identifying and fixing issues in the code.

Add your answer
right arrow

Q4. Batch calls in OData, association and navigation in OData?

Ans.

Batch calls allow multiple requests in a single HTTP call. Associations and navigation allow querying related data in OData.

  • Batch calls can improve performance by reducing the number of HTTP requests.

  • Associations define relationships between entities in OData.

  • Navigation allows querying related entities using the $expand query option.

  • Example: /Orders?$expand=Customer

  • Example: /Customers('ALFKI')/Orders

Add your answer
right arrow
Discover Deloitte interview dos and don'ts from real experiences

Q5. What is Encapsulation and Polymorphism in OO ABAP?

Ans.

Encapsulation is the concept of hiding implementation details and exposing only necessary information. Polymorphism is the ability of objects to take on multiple forms.

  • Encapsulation helps in achieving data security and prevents unauthorized access to data.

  • Polymorphism allows objects to be treated as instances of their own class or as instances of their parent class.

  • Encapsulation and Polymorphism are key concepts in Object-Oriented Programming.

  • Example of Encapsulation: Private...read more

Add your answer
right arrow

Q6. Can we achieve multiple inheritance in ABAP?

Ans.

No, ABAP does not support multiple inheritance.

  • ABAP only supports single inheritance through the use of interfaces and abstract classes.

  • Multiple inheritance can lead to ambiguity and complexity in the code.

  • However, ABAP does allow for the implementation of multiple interfaces.

  • Example: a class can implement both IF_A and IF_B interfaces.

Add your answer
right arrow
Are these interview questions helpful?

Q7. Can we have multiple constructors for a class?

Ans.

Yes, a class can have multiple constructors with different parameters.

  • Constructors are used to initialize objects of a class.

  • Multiple constructors can be defined with different parameters.

  • The constructor with the matching parameters is called when an object is created.

  • Constructors can also call other constructors using 'this' keyword.

  • Example: public class MyClass { public MyClass() {} public MyClass(int x) {} }

Add your answer
right arrow

Q8. How do you setup and manager role-based permissions?

Ans.

Setting up role-based permissions involves defining roles, assigning permissions to roles, and managing user access based on roles.

  • Define different roles based on job functions or responsibilities

  • Assign specific permissions to each role, determining what actions users in that role can perform

  • Grant or revoke access to resources based on roles

  • Regularly review and update roles and permissions to ensure security and compliance

  • Use role-based access control (RBAC) to streamline per...read more

Add your answer
right arrow
Share interview questions and help millions of jobseekers 🌟
man with laptop

Q9. What are business rules constructed using?

Ans.

Business rules are constructed using logic and conditions.

  • Logic

  • Conditions

  • Constraints

  • Decision tables

  • Rule engines

Add your answer
right arrow

Q10. CASE STUDIE:- CALCULATE REVENUE OF ICE CREAM PARLOUR

Ans.

To calculate revenue of an ice cream parlor, we need to consider factors like sales volume, pricing strategy, and operational costs.

  • Determine the average number of customers per day and the average amount spent per customer

  • Consider the cost of ingredients, labor, rent, and utilities

  • Analyze the competition and adjust pricing strategy accordingly

  • Explore opportunities for upselling and cross-selling

  • Track sales and expenses regularly to identify trends and make informed decisions

Add your answer
right arrow

Q11. New technology in the field of semiconductor industry?

Ans.

The semiconductor industry is constantly evolving with new technologies such as AI, IoT, and 5G driving innovation.

  • AI is being used to improve chip design and manufacturing processes

  • IoT is driving demand for low-power and high-performance chips

  • 5G is increasing demand for high-speed and low-latency chips

  • Emerging technologies such as quantum computing and neuromorphic computing are being explored for future applications

Add your answer
right arrow

Q12. Do SWOT analysis of your company.

Ans.

SWOT analysis of our company reveals strengths in brand recognition and customer loyalty, weaknesses in limited product offerings, opportunities in expanding into new markets, and threats from increasing competition.

  • Strengths: strong brand recognition, high customer loyalty, experienced management team

  • Weaknesses: limited product offerings, lack of diversification, dependence on a few key suppliers

  • Opportunities: expanding into new markets, developing new products, strategic pa...read more

Add your answer
right arrow

Q13. What controls have you worked on

Ans.

I have worked on implementing financial controls in a corporate setting.

  • Implemented segregation of duties to prevent fraud

  • Developed approval processes for financial transactions

  • Established monitoring mechanisms to detect anomalies

  • Created documentation for control procedures

Add your answer
right arrow

Q14. What is Risk and control matrix

Ans.

Risk and control matrix is a tool used to identify, assess, and manage risks within an organization.

  • It outlines potential risks faced by the organization

  • It identifies existing controls in place to mitigate those risks

  • It helps in evaluating the effectiveness of the controls

  • It assists in prioritizing risks based on their impact and likelihood

  • It is commonly used in risk management and internal audit processes

Add your answer
right arrow

Q15. New technologies in the field of manufacturing.

Ans.

New technologies are revolutionizing manufacturing, from automation to 3D printing.

  • Automation and robotics are increasing efficiency and reducing costs.

  • Additive manufacturing, such as 3D printing, is allowing for more customization and faster prototyping.

  • Artificial intelligence and machine learning are improving quality control and predictive maintenance.

  • Internet of Things (IoT) devices are enabling real-time monitoring and optimization of production processes.

  • Augmented and v...read more

Add your answer
right arrow

Q16. Reverse a Number Problem Statement

Given an integer 'N', write a program to generate the reverse of the number and print the resulting reversed number.

The reversed number should not include any leading zeros t...read more

Ans.

Reverse a given integer and remove leading zeros.

  • Iterate through the digits of the number from right to left and build the reversed number.

  • Skip any leading zeros in the reversed number.

  • Ensure the reversed number does not exceed the constraints of 0 <= N < 10^8.

View 2 more answers
right arrow

Q17. Annotations used in CDS?

Ans.

Annotations are used in CDS to define metadata and behavior of entities and fields.

  • Annotations are defined using the @ symbol followed by the annotation name

  • Annotations can be used to define metadata such as labels, descriptions, and visibility

  • Annotations can also be used to define behavior such as validation rules and default values

  • Examples of annotations include @Label, @Description, @Validation.rule, and @Default

Add your answer
right arrow

Q18. Cardinality in Odata and CDS?

Ans.

Cardinality defines the relationship between entities in OData and CDS.

  • Cardinality in OData is defined using navigation properties and can be one-to-one, one-to-many, or many-to-many.

  • In CDS, cardinality is defined using associations and can be one-to-one, one-to-many, or many-to-many.

  • Cardinality can be specified using symbols such as *, 1, or n.

  • For example, a one-to-many relationship between a customer and their orders would have a cardinality of 1:n.

Add your answer
right arrow

Q19. BUSINESS FACTORS IMPACTINF ANY INDUSTRY

Ans.

Business factors affecting any industry include economic conditions, competition, technology, and government regulations.

  • Economic conditions such as inflation, recession, and interest rates can impact the industry's growth and profitability.

  • Competition from existing and new players can affect market share and pricing strategies.

  • Technology advancements can disrupt traditional business models and create new opportunities.

  • Government regulations such as taxes, tariffs, and trade ...read more

Add your answer
right arrow

Q20. Who regulates Markets in US? Responsibilities of their Market regulator?

Ans.

The Securities and Exchange Commission (SEC) regulates markets in the US. Their responsibilities include enforcing federal securities laws, protecting investors, and maintaining fair and orderly markets.

  • The SEC is responsible for overseeing securities exchanges such as the New York Stock Exchange (NYSE) and NASDAQ.

  • They enforce laws such as the Securities Act of 1933 and the Securities Exchange Act of 1934.

  • The SEC also regulates investment advisers, mutual funds, and other inv...read more

Add your answer
right arrow

Q21. How to find Largest element in the array wid most efficiency?

Ans.

Use a loop to iterate through the array and keep track of the largest element.

  • Initialize a variable to store the largest element as the first element of the array

  • Loop through the array and compare each element to the current largest element

  • If the current element is larger, update the largest element variable

  • Return the largest element variable

Add your answer
right arrow

Q22. You know Normalizastion? Tell me what is 3rd normal form

Ans.

3rd normal form is a database normalization technique where every non-key attribute is dependent on the primary key.

  • In 3NF, there should be no transitive dependencies between non-key attributes.

  • It reduces data redundancy and improves data integrity.

  • Example: A table with columns for customer ID, order ID, and product ID. The product name should not be stored in this table as it is dependent on the product ID, not the customer or order ID.

  • Another example: A table with columns f...read more

Add your answer
right arrow

Q23. What is Close-Ended Mutual Fund?

Ans.

A mutual fund with a fixed number of shares, traded on an exchange like a stock.

  • Investors buy and sell shares of the fund on the exchange

  • The price of the shares is determined by supply and demand

  • The fund is managed by a professional portfolio manager

  • Examples include index funds and ETFs

Add your answer
right arrow

Q24. What is a stock and a bond?

Ans.

A stock is a share of ownership in a company, while a bond is a debt security issued by a company or government.

  • Stocks represent ownership in a company and give shareholders voting rights and potential dividends.

  • Bonds represent a loan to a company or government and pay interest to the bondholder.

  • Stocks are generally considered riskier but offer higher potential returns, while bonds are considered safer but offer lower returns.

  • Investors often use a combination of stocks and bo...read more

Add your answer
right arrow

Q25. On resume- difference between html5 and its previous version?

Ans.

HTML5 introduced new features like canvas, video, audio, and semantic elements compared to its previous version.

  • HTML5 introduced new semantic elements like <header>, <footer>, <nav>, <article>, <section> for better structure and accessibility.

  • HTML5 added support for audio and video elements without the need for plugins, making multimedia integration easier.

  • HTML5 introduced the <canvas> element for drawing graphics and animations directly on the web page.

  • HTML5 brought improvem...read more

Add your answer
right arrow

Q26. code to print largest number, code to find prime number

Ans.

Code to print largest number and find prime number.

  • For printing largest number, initialize a variable with the first element of the array and loop through the array to compare each element with the variable. If the element is greater than the variable, update the variable with the element.

  • For finding prime number, loop through the numbers from 2 to n-1 and check if n is divisible by any of them. If n is divisible by any number, it is not a prime number.

  • To optimize prime numbe...read more

Add your answer
right arrow

Q27. who are the clients of Deloitte?

Ans.

Deloitte's clients are diverse and include businesses, governments, and non-profit organizations.

  • Deloitte serves clients in various industries such as healthcare, financial services, technology, and consumer products.

  • Their clients range from small startups to large multinational corporations.

  • They also work with government agencies and non-profit organizations.

  • Examples of their clients include Amazon, Coca-Cola, and the United States Department of Defense.

Add your answer
right arrow

Q28. What do you know about conditional loop

Ans.

Conditional loop is a loop that executes a block of code repeatedly as long as a specified condition is true.

  • Conditional loop is used to iterate over a block of code multiple times based on a condition.

  • The loop will continue to execute as long as the specified condition remains true.

  • Common examples of conditional loops include 'while' and 'for' loops in programming languages.

Add your answer
right arrow

Q29. How do you handle internal conflicts?

Ans.

I address internal conflicts by promoting open communication, active listening, and seeking common ground.

  • Encourage open communication to understand all perspectives

  • Practice active listening to show empathy and respect

  • Seek common ground and compromise to resolve conflicts peacefully

Add your answer
right arrow

Q30. What is monolithic andmicroservices

Ans.

Monolithic architecture is a single-tiered software application where all components are tightly coupled, while microservices architecture is a distributed approach where the application is broken down into smaller, independent services.

  • Monolithic architecture: all components are tightly coupled in a single-tiered application

  • Microservices architecture: application is broken down into smaller, independent services

  • Monolithic architecture can be harder to scale and maintain

  • Micro...read more

Add your answer
right arrow

Q31. What is sql how it works

Ans.

SQL is a programming language used for managing and manipulating relational databases.

  • SQL stands for Structured Query Language

  • It is used to communicate with databases to perform tasks such as querying data, updating data, and creating tables

  • SQL statements are written in a specific syntax and can be used to retrieve specific data from a database

  • Examples of SQL commands include SELECT, INSERT, UPDATE, and DELETE

Add your answer
right arrow

Q32. Sort employee by name using java8

Ans.

Use Java 8 streams and lambda expressions to sort a list of employees by name.

  • Create a list of Employee objects with names.

  • Use stream() method to convert the list to a stream.

  • Use sorted() method with Comparator.comparing() to sort by name.

  • Collect the sorted stream back to a list.

Add your answer
right arrow

Q33. Write a program to find biggest of 3

Ans.

Program to find the biggest of 3 numbers

  • Create a function that takes in 3 numbers as input

  • Compare the numbers to find the biggest one

  • Return the biggest number as output

Add your answer
right arrow

Q34. Different businesses of Deloitte

Ans.

Deloitte offers a range of services across various industries including audit, consulting, tax, and advisory.

  • Audit and Assurance

  • Consulting

  • Tax

  • Advisory

  • Financial Advisory

  • Risk Advisory

  • Technology Consulting

  • Human Capital

  • Strategy and Operations

  • Mergers and Acquisitions

  • Analytics and Cognitive

  • Cybersecurity

  • Supply Chain and Manufacturing Operations

  • Real Estate

  • Government and Public Services

  • Life Sciences and Healthcare

  • Consumer and Industrial Products

  • Energy and Resources

  • Financial Services

Add your answer
right arrow

Q35. What are some of weaknesses

Ans.

Some weaknesses include perfectionism, difficulty delegating tasks, and lack of public speaking skills.

  • Perfectionism can lead to spending too much time on tasks and missing deadlines

  • Difficulty delegating tasks can result in feeling overwhelmed and not utilizing team members effectively

  • Lack of public speaking skills may hinder effective communication and presentation of ideas

Add your answer
right arrow

Q36. What are joins

Ans.

Joins are used to combine data from two or more tables based on a related column.

  • Joins are used in SQL to retrieve data from multiple tables.

  • There are different types of joins such as inner join, left join, right join, and full outer join.

  • The join condition is specified using the ON keyword and the related columns.

  • Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column;

Add your answer
right arrow

Q37. Execution order of sql operations

Ans.

SQL operations are executed in the following order: FROM, WHERE, GROUP BY, HAVING, SELECT, ORDER BY.

  • FROM clause is executed first to retrieve data from tables

  • WHERE clause filters the data based on specified conditions

  • GROUP BY groups the data based on specified columns

  • HAVING filters the grouped data

  • SELECT selects the columns to be displayed

  • ORDER BY sorts the final result set

Add your answer
right arrow

Q38. What is immutable

Ans.

An immutable object is an object whose state cannot be modified after it is created.

  • Immutable objects are often used in functional programming to ensure data integrity.

  • Examples of immutable objects include String, Integer, and Tuple in Python.

  • Immutable objects are thread-safe and can be shared across multiple threads without the risk of data corruption.

Add your answer
right arrow

Q39. System design of university

Ans.

The system design for a university involves various components such as student information systems, course management systems, and communication platforms.

  • Student information systems to manage student records, registration, and academic progress

  • Course management systems for scheduling classes, assigning instructors, and tracking grades

  • Communication platforms for students, faculty, and staff to interact and share information

  • Integration of learning management systems for online...read more

Add your answer
right arrow

Q40. If you are given an array of 6 numbers 123345 give the logic for finding the duplicate numbers in this array Other technical questions where purely based on what we say previously. When I talked about my course...

read more
Ans.

Logic to find duplicate numbers in an array of 6 numbers

  • Iterate through the array and compare each element with the rest of the elements

  • If a match is found, print the duplicate number

  • Use nested loops to compare all elements

  • Alternatively, use a hash table to keep track of seen elements

View 6 more answers
right arrow

Q41. Suppose there is a room in the office and X people enter room throughout the day, Y people leave throughout the day [continuously people are entering the room, some are staying there, and rest are going out] .....

read more
Ans.

Code to calculate number of people in a room at EOD given X enter and Y leave throughout the day.

  • Create a variable to keep track of the current number of people in the room

  • Increment the variable by X every time someone enters the room

  • Decrement the variable by Y every time someone leaves the room

  • Return the final value of the variable at the end of the day

  • Example: If 10 people enter and 5 leave, there will be 5 people in the room at EOD

View 10 more answers
right arrow

Q42. Is Javascript a single/multi threaded language? If single threaded then how does backend calls work?

Ans.

Javascript is a single-threaded language, but it can handle asynchronous operations through callbacks and promises.

  • Javascript is single-threaded, meaning it can only execute one task at a time.

  • However, it can handle asynchronous operations by using callbacks, promises, and async/await.

  • Backend calls in Javascript are typically made using asynchronous functions, allowing the program to continue executing other tasks while waiting for the response.

  • For example, when making an HTT...read more

Add your answer
right arrow

Q43. What is useEffect Hook? What are dependency arrays wrt useEffect?

Ans.

useEffect Hook is a built-in hook in React that allows you to perform side effects in functional components.

  • useEffect Hook is used to handle side effects in functional components, such as fetching data, subscribing to events, or manipulating the DOM.

  • It takes two arguments: a function that represents the side effect, and an optional dependency array.

  • The function passed to useEffect will be executed after every render, unless the dependency array is provided.

  • The dependency arra...read more

Add your answer
right arrow

Q44. What are the different LifeCycle Methods of React?

Ans.

React has three main lifecycle methods: Mounting, Updating, and Unmounting.

  • Mounting: These methods are called when an instance of a component is being created and inserted into the DOM.

  • Updating: These methods are called when a component is being re-rendered as a result of changes to either its props or state.

  • Unmounting: This method is called when a component is being removed from the DOM.

Add your answer
right arrow

Q45. Sort 0 and 1 Problem Statement

Given an integer array ARR of size N containing only integers 0 and 1, implement a function to sort this array. The solution should scan the array only once without using any addi...read more

Ans.

The function sorts an integer array containing only 0s and 1s in linear time complexity.

  • Use two pointers, one starting from the beginning and the other from the end of the array.

  • Swap the elements at the pointers if the element at the beginning pointer is 1 and the element at the end pointer is 0.

  • Continue moving the pointers towards each other until they meet in the middle of the array.

View 2 more answers
right arrow

Q46. What are the different hooks in React?

Ans.

React hooks are functions that allow you to use state and other React features in functional components.

  • useState() - for managing state in functional components

  • useEffect() - for performing side effects in functional components

  • useContext() - for accessing context in functional components

  • useReducer() - for managing complex state and actions in functional components

  • useCallback() - for memoizing functions in functional components

  • useMemo() - for memoizing values in functional comp...read more

Add your answer
right arrow

Q47. Name different package managers of Node JS and Javascript

Ans.

npm is the most popular package manager for Node.js and JavaScript.

  • npm (Node Package Manager) is the default package manager for Node.js and JavaScript.

  • Yarn is an alternative package manager that offers faster and more reliable dependency management.

  • pnpm is another package manager that uses a unique approach of hard-linking dependencies to save disk space.

  • Bower is a package manager specifically designed for front-end web development.

  • NPM Enterprise is a paid package manager wi...read more

Add your answer
right arrow

Q48. Find K'th Character of Decrypted String

You are given an encrypted string where repeated substrings are represented by the substring followed by its count. Your task is to find the K'th character of the decrypt...read more

Ans.

Given an encrypted string with repeated substrings represented by counts, find the K'th character of the decrypted string.

  • Parse the encrypted string to extract substrings and their counts

  • Iterate through the substrings and counts to build the decrypted string

  • Track the position in the decrypted string to find the K'th character

View 1 answer
right arrow

Q49. How javascript runs on servers?

Ans.

JavaScript can run on servers using server-side JavaScript platforms like Node.js.

  • JavaScript can be executed on servers using server-side JavaScript platforms like Node.js.

  • Node.js allows JavaScript to run on the server-side by providing a runtime environment.

  • Server-side JavaScript enables developers to build scalable and high-performance web applications.

  • Node.js uses the V8 JavaScript engine to execute JavaScript code on the server.

  • Server-side JavaScript can handle tasks such...read more

Add your answer
right arrow

Q50. Convert BST to Greater Sum Tree

Given a Binary Search Tree (BST) of integers, your task is to convert it into a greater sum tree. In the greater sum tree, each node's value should be replaced with the sum of al...read more

Ans.

The task is to convert a Binary Search Tree into a Greater Sum Tree.

  • Traverse the BST in reverse inorder (right, root, left) to visit nodes in descending order.

  • Keep track of the sum of all greater nodes encountered so far.

  • Update the value of each node by adding the sum of greater nodes and update the sum.

  • Continue this process until all nodes have been visited.

  • Return the modified BST.

Add your answer
right arrow

Q51. Pair Sum Problem Statement

You are provided with an array ARR consisting of N distinct integers in ascending order and an integer TARGET. Your objective is to count all the distinct pairs in ARR whose sum equal...read more

Ans.

Count distinct pairs in an array whose sum equals a given target.

  • Use two pointers approach to iterate through the array and find pairs with sum equal to target.

  • Keep track of visited pairs to avoid counting duplicates.

  • Return -1 if no such pair exists with the given target.

View 1 answer
right arrow

Q52. Sort 0 1 2 Problem Statement

Given an integer array arr of size 'N' containing only 0s, 1s, and 2s, write an algorithm to sort the array.

Input:

The first line contains an integer 'T' representing the number of...read more
Ans.

Sort an array of 0s, 1s, and 2s in linear time complexity.

  • Use three pointers to keep track of the positions of 0s, 1s, and 2s in the array.

  • Iterate through the array and swap elements based on the values encountered.

  • Maintain left pointer for 0s, right pointer for 2s, and current pointer for traversal.

  • Example: If current element is 0, swap it with element at left pointer and increment both pointers.

View 1 answer
right arrow

Q53. Cycle Detection in Undirected Graph Problem Statement

You are provided with an undirected graph containing 'N' vertices and 'M' edges. The vertices are numbered from 1 to 'N'. Your objective is to determine whe...read more

Ans.

Detect if an undirected graph contains a cycle.

  • Use Depth First Search (DFS) to traverse the graph and detect cycles.

  • Maintain a visited array to keep track of visited vertices.

  • If a visited vertex is encountered again during DFS, a cycle exists.

  • Check for back edges while traversing the graph.

  • Consider disconnected graphs as well.

Add your answer
right arrow

Q54. Next Smaller Palindrome Problem Statement

You are given a palindrome number represented as a string S. Your task is to find the largest palindrome number that is strictly less than S.

Example:

Input:
T = 2
S1 = ...read more
Ans.

Given a palindrome number represented as a string, find the largest palindrome number that is strictly less than the given number.

  • Iterate from the middle towards the start and end of the string to find the next smaller palindrome.

  • If the number is odd in length, simply mirror the left half to the right half to get the next smaller palindrome.

  • If the number is even in length, decrement the middle digit and mirror the left half to the right half to get the next smaller palindrome...read more

Add your answer
right arrow

Q55. Longest Common Subsequence Problem Statement

Given two strings STR1 and STR2, determine the length of their longest common subsequence.

A subsequence is a sequence that can be derived from another sequence by d...read more

Ans.

The problem involves finding the length of the longest common subsequence between two given strings.

  • Use dynamic programming to solve this problem efficiently.

  • Create a 2D array to store the lengths of common subsequences of substrings.

  • Iterate through the strings to fill the array and find the length of the longest common subsequence.

  • Example: For input STR1 = 'abcde' and STR2 = 'ace', the longest common subsequence is 'ace' with a length of 3.

Add your answer
right arrow

Q56. Boundary Traversal of a Binary Tree

Given a binary tree of integers, your task is to output the boundary nodes of this binary tree in Anti-Clockwise order, starting from the root node.

Explanation:

The boundary...read more

Ans.

Output the boundary nodes of a binary tree in Anti-Clockwise order, starting from the root node.

  • Traverse the left boundary nodes in top-down order

  • Traverse the leaf nodes from left to right

  • Traverse the right boundary nodes in bottom-up order

  • Combine the above traversals to get the boundary nodes in Anti-Clockwise order

Add your answer
right arrow

Q57. How good are you in java

Ans.

I am proficient in Java with experience in developing various applications.

  • I have been working with Java for over 5 years

  • I have developed multiple applications using Java, including a web-based inventory management system

  • I am familiar with various Java frameworks such as Spring and Hibernate

  • I keep myself updated with the latest Java technologies and trends

Add your answer
right arrow

Q58. Search an Element in a Sorted Array

Given a sorted array 'A' of 'N' integers, determine whether a number 'X' exists within this array for a series of queries. For each query, print 1 if 'X' exists in the array,...read more

Ans.

Search for a number in a sorted array and determine its existence for multiple queries.

  • Use binary search algorithm to efficiently search for each query integer in the sorted array.

  • For each query integer 'X', check if it exists in the array 'A' and output 1 if found, 0 otherwise.

  • Ensure the array 'A' is sorted in non-decreasing order to apply binary search effectively.

Add your answer
right arrow

Q59. Case : I am a US based company and I sell 3 products A, B, C (I don’t rem exact name) and I am having losses. I assume the reason for facing losses can be either economic downturn, new competitors, or internal...

read more
Ans.

The exact reason for facing losses cannot be determined without further analysis.

  • Further analysis is needed to identify the root cause of the losses.

  • Economic downturn, new competitors, and internal problems are all potential factors.

  • Examples of internal problems could include poor management, inefficient processes, or high overhead costs.

View 2 more answers
right arrow

Q60. How to find the minimum number from a given set of numbers ?

Ans.

To find the minimum number from a set of numbers, compare each number with the others and select the smallest.

  • Compare each number with the others in the set

  • Select the smallest number as the minimum

View 3 more answers
right arrow

Q61. Knowledge Management is a growing field. You are a smaller company going up against a more established one. What would you do?

Ans.

Establish a niche and focus on personalized service to differentiate from the larger company.

  • Identify a specific area of knowledge management where the larger company may not be as strong

  • Offer personalized service and tailored solutions to clients

  • Leverage technology to streamline processes and improve efficiency

  • Build a strong online presence through social media and content marketing

  • Partner with other smaller companies to offer a wider range of services

Add your answer
right arrow

Q62. What are joins and name one case where you applied it?

Ans.

Joins are used to combine data from two or more tables based on a related column.

  • Joins are used in SQL to retrieve data from multiple tables.

  • Common types of joins include inner join, left join, right join, and full outer join.

  • One case where I applied joins was when I needed to retrieve customer information and their corresponding orders from two separate tables.

  • Another example is when I needed to combine data from a table of employees and a table of departments to determine w...read more

Add your answer
right arrow

Q63. Bursting Balloons Problem

Given an array ARR of size N, where each element represents the height of a balloon. The task is to destroy all balloons by shooting arrows from left to right. When an arrow hits a bal...read more

Ans.

To burst all balloons by shooting arrows from left to right, determine the minimum number of arrows needed.

  • Iterate through the array and keep track of the maximum height of balloons that can be burst with one arrow.

  • Increment the arrow count whenever a balloon height exceeds the maximum height.

  • Return the total arrow count needed to burst all balloons.

Add your answer
right arrow

Q64. What are 5 heads of income? What is depreciation and types? What is accrued interest?

Ans.

The 5 heads of income are salary, house property, business/profession, capital gains, and other sources.

  • Salary income includes income from employment

  • House property income includes rental income

  • Business/profession income includes income from self-employment

  • Capital gains income includes profits from sale of assets

  • Other sources income includes income from sources not covered under the other heads

  • Depreciation is the decrease in value of an asset over time

  • Types of depreciation inc...read more

Add your answer
right arrow

Q65. What do you know about tax? Cost accounting vs managerial accounting?

Ans.

Tax is a mandatory financial charge imposed by the government on individuals and businesses.

  • Tax is used to fund public services and infrastructure

  • There are different types of taxes such as income tax, sales tax, property tax, etc.

  • Tax laws and regulations vary by country and jurisdiction

  • Cost accounting is focused on determining the cost of producing a product or service

  • Managerial accounting is focused on providing financial information to help managers make business decisions

  • B...read more

Add your answer
right arrow

Q66. Are flexible with relocation

Ans.

Yes, I am flexible with relocation.

  • I am open to exploring new opportunities in different locations.

  • I understand that relocation may be necessary for career growth.

  • I am willing to consider all options and make a decision based on what is best for the company and my career.

  • I have relocated in the past for work and am familiar with the process.

  • I am excited about the possibility of experiencing new places and cultures.

View 2 more answers
right arrow

Q67. A big multinational computer($8 billion)hardware and software services company is planning to de-merge its business into two units -hardware business and software services / consulting business. After the de-me...

read more
Ans.

The strategy for the division of IT systems in the de-merger of the multinational computer hardware and software services company.

  • For Applications: Evaluate the criticality and interdependencies of each application, prioritize based on business needs, and allocate resources accordingly.

  • For Data Centers: Assess the capacity and redundancy requirements of each unit, consolidate or establish new data centers as needed, and ensure seamless transition of data and services.

  • For Test...read more

Add your answer
right arrow

Q68. What do you think telecom operators should do to prevent this problem?

Ans.

Telecom operators should invest in robust network infrastructure and implement strict security measures to prevent problems.

  • Invest in upgrading network infrastructure to handle increasing data traffic

  • Implement strong security measures to protect against cyber threats

  • Regularly monitor and analyze network performance to identify and address potential issues

  • Provide reliable customer support to promptly address customer complaints and concerns

  • Offer competitive pricing and attract...read more

Add your answer
right arrow

Q69. A Telecommunication giant has been mandated by the Indonesia government to provide internet services to all the residents of the country. The company is already a player in the market, providing other services...

read more
Ans.

As a Deloitte consultant, I would proceed by conducting a feasibility study and developing a comprehensive strategy.

  • Conduct a feasibility study to assess the current infrastructure and identify gaps

  • Develop a comprehensive strategy that includes network expansion, technology upgrades, and partnerships with local providers

  • Establish a project management team to oversee the implementation of the strategy

  • Engage with stakeholders, including government officials, to ensure complianc...read more

Add your answer
right arrow

Q70. Items to add in balancesheet right after trial balace.

Ans.

Items to add in balancesheet after trial balance

  • Accrued expenses

  • Prepaid expenses

  • Depreciation

  • Deferred revenue

  • Accrued interest

  • Goodwill

  • Intangible assets

  • Long-term investments

  • Long-term debt

  • Shareholder's equity

Add your answer
right arrow

Q71. How good are you with SQL?

Ans.

I am proficient in SQL and have experience in writing complex queries.

  • Proficient in writing complex queries

  • Experience in working with large databases

  • Familiarity with various SQL functions and operators

  • Ability to optimize queries for better performance

Add your answer
right arrow

Q72. Explain following vulnerabilities 1. IDOR 2. Types of XSS 3. SQLi

Ans.

IDOR is Insecure Direct Object Reference, XSS is Cross-Site Scripting, and SQLi is SQL Injection.

  • IDOR occurs when an application allows direct access to internal objects without proper authorization.

  • XSS refers to injecting malicious scripts into web pages viewed by other users, compromising their security.

  • SQLi is a technique where an attacker inserts malicious SQL code into a query, manipulating the database.

  • Example of IDOR: Accessing another user's private data by modifying ...read more

Add your answer
right arrow

Q73. Find vulnerabilities in a simulated network and prepare a VAPT report.

Ans.

To find vulnerabilities in a simulated network and prepare a VAPT report.

  • Conduct a vulnerability assessment using tools like Nessus, OpenVAS, etc.

  • Identify vulnerabilities and their severity levels

  • Prepare a detailed report with recommendations for remediation

  • Include an executive summary for non-technical stakeholders

Add your answer
right arrow

Q74. Journal entry for provision for doubtful debt

Ans.

A provision for doubtful debt is a journal entry made to account for potential losses from customers who may not pay their debts.

  • Provision for doubtful debt is recorded as an expense in the income statement.

  • It is created by debiting the provision for doubtful debt account and crediting the bad debt expense account.

  • The provision is based on an estimate of the amount of debt that is likely to become uncollectible.

  • The provision is usually a percentage of the accounts receivable ...read more

View 1 answer
right arrow

Q75. Differance between leadership and managemnt.

Ans.

Leadership is about inspiring and guiding a team towards a common goal, while management is about planning, organizing, and controlling resources to achieve that goal.

  • Leadership focuses on people, while management focuses on processes and systems.

  • Leadership is about setting a vision and motivating others to work towards it, while management is about ensuring that the necessary resources are in place to achieve that vision.

  • Leadership involves taking risks and being innovative,...read more

Add your answer
right arrow

Q76. Draft 5 observation along with risk and implications

Ans.

Observations, risks, and implications for an Assistant Manager role

  • Observation 1: Lack of clear communication among team members

  • Risk 1: Misunderstandings leading to errors in tasks

  • Implication 1: Decreased productivity and potential conflicts within the team

  • Observation 2: High employee turnover rate

  • Risk 2: Difficulty in maintaining a stable and experienced team

  • Implication 2: Increased recruitment and training costs, impact on team morale

  • Observation 3: Inconsistent adherence to...read more

Add your answer
right arrow

Q77. How will you merge two CSV file with left joint in python

Ans.

Merging two CSV files with left join in Python.

  • Read both CSV files using pandas.

  • Perform left join using merge() function.

  • Save the merged data to a new CSV file.

Add your answer
right arrow

Q78. Explain your projects !! Which Programming languages do u know ? Write a program of your choice in your preferred programming language !! What are your long term goals ? What are your preferred technologies ?

Ans.

I have worked on multiple projects using various programming languages. My long term goal is to become a data analyst and my preferred technologies are Python and SQL.

  • Projects: E-commerce website using PHP, Inventory management system using Java, Data analysis of customer behavior using Python

  • Programming languages: Python, Java, PHP, SQL

  • Program: Python program to calculate the factorial of a number

  • Long term goal: To become a data analyst

  • Preferred technologies: Python and SQL

Add your answer
right arrow

Q79. Scenario how to create 1 to 1 relationship

Ans.

To create a 1 to 1 relationship in Salesforce, use a lookup field on the child object pointing to the parent object.

  • Create a lookup field on the child object that references the parent object.

  • Ensure that the lookup field has a unique constraint to enforce the 1 to 1 relationship.

  • Use validation rules or triggers to prevent multiple child records from being linked to the same parent record.

View 1 answer
right arrow

Q80. Tell me about different type of risks

Ans.

Different types of risks include financial risk, operational risk, strategic risk, compliance risk, and reputational risk.

  • Financial risk: Risk related to financial markets, such as market risk, credit risk, and liquidity risk.

  • Operational risk: Risk of loss resulting from inadequate or failed internal processes, people, and systems.

  • Strategic risk: Risk related to the organization's long-term goals and objectives, such as competition and market changes.

  • Compliance risk: Risk of ...read more

Add your answer
right arrow

Q81. Diff b/w authorisation and authentication

Ans.

Authorization is the process of granting access to a resource, while authentication is the process of verifying the identity of a user.

  • Authorization determines what a user can do with a resource, while authentication verifies who the user is.

  • Authorization is based on permissions and roles, while authentication is based on credentials such as username and password.

  • Examples of authorization include granting access to a file or database, while examples of authentication include ...read more

Add your answer
right arrow

Q82. Can you guess the reason behind call drops?

Ans.

Call drops can be caused by various factors such as network congestion, poor signal strength, and technical issues.

  • Network congestion due to high call volume or limited bandwidth

  • Poor signal strength caused by distance from cell tower or obstacles

  • Technical issues such as software glitches or hardware malfunctions

  • Interference from other electronic devices

  • Inadequate network coverage in certain areas

  • User error such as accidentally hanging up or losing signal

  • Weather conditions suc...read more

Add your answer
right arrow

Q83. what all changes are there from AS to IND-AS in IND-AS 116

Ans.

Changes from AS to IND-AS in IND-AS 116

  • AS 19 and IND-AS 116 are similar but IND-AS 116 has some changes

  • AS 19 allowed two methods of accounting for leases, while IND-AS 116 only allows one

  • IND-AS 116 requires lessees to recognize all leases on their balance sheet

  • IND-AS 116 requires lessors to classify leases as either operating or finance leases

  • IND-AS 116 requires additional disclosures in the financial statements

Add your answer
right arrow

Q84. Describe sql commands and basic dsa question

Ans.

SQL commands are used to interact with databases, while DSA questions test problem-solving skills.

  • SQL commands include SELECT, INSERT, UPDATE, DELETE for querying and modifying data in databases

  • Basic DSA questions may involve sorting algorithms, data structures like arrays, linked lists, trees

  • Understanding of time complexity, space complexity, and problem-solving strategies is important

Add your answer
right arrow

Q85. Difference between current and non current in balance sheet

Ans.

Current assets/liabilities are expected to be used/settled within a year, while non-current assets/liabilities have a longer life span.

  • Current assets include cash, accounts receivable, inventory, and prepaid expenses.

  • Current liabilities include accounts payable, short-term loans, and accrued expenses.

  • Non-current assets include property, plant, and equipment, long-term investments, and intangible assets.

  • Non-current liabilities include long-term loans, deferred tax liabilities,...read more

Add your answer
right arrow

Q86. How the act is enacted

Ans.

The act is enacted through a series of steps and procedures to ensure compliance and implementation.

  • The act is typically passed by a legislative body, such as a parliament or congress.

  • It may involve the creation of regulations and guidelines to clarify the intent of the act.

  • Enforcement mechanisms are put in place to ensure compliance with the act.

  • Monitoring and evaluation processes are often established to assess the effectiveness of the act.

  • Amendments or revisions may be mad...read more

Add your answer
right arrow

Q87. Diff b/w encryption and hashing

Ans.

Encryption is reversible while hashing is irreversible.

  • Encryption is the process of converting plain text into cipher text using an algorithm and a key.

  • Hashing is the process of converting plain text into a fixed-length string of characters using a hash function.

  • Encryption can be decrypted using a key while hashing cannot be reversed.

  • Encryption is used to protect data while hashing is used to verify data integrity.

  • Examples of encryption include AES, RSA, and DES while example...read more

Add your answer
right arrow

Q88. difference between agile and waterfall methodology of development (methods used in IT industry)

Ans.

Agile is iterative and flexible, while waterfall is linear and rigid.

  • Agile focuses on delivering working software in short iterations

  • Waterfall follows a sequential approach with distinct phases

  • Agile encourages collaboration and adaptability

  • Waterfall emphasizes planning and documentation

  • Agile is better suited for complex and uncertain projects

  • Waterfall is better suited for projects with well-defined requirements

  • Examples of agile methodologies include Scrum and Kanban

  • Examples o...read more

Add your answer
right arrow

Q89. Assertions and procedure for audit of debtors

Ans.

Assertions and procedures for auditing debtors

  • The existence assertion: ensuring that the debtors actually exist and are valid

  • The completeness assertion: ensuring that all debtors are included in the financial statements

  • The valuation assertion: ensuring that the debtors are valued correctly

  • The rights and obligations assertion: ensuring that the company has the right to collect the debt and that the debtors have an obligation to pay

  • The cutoff assertion: ensuring that all transa...read more

Add your answer
right arrow

Q90. Explain about the given html command.

Ans.

The given HTML command is used to create a hyperlink in a webpage.

  • The <a> tag is used to define a hyperlink in HTML.

  • The href attribute specifies the URL of the page the link goes to.

  • Text between the opening and closing <a> tags is the clickable text of the link.

Add your answer
right arrow

Q91. who is the rbi governor

Ans.

Shaktikanta Das is the current RBI Governor.

  • Shaktikanta Das was appointed as the 25th Governor of the Reserve Bank of India in December 2018.

  • He has previously served as the Economic Affairs Secretary and Revenue Secretary of India.

  • As RBI Governor, he has focused on maintaining financial stability and supporting economic growth.

Add your answer
right arrow

Q92. A cable box manufacturer wants to outsource manufacturing

Ans.

Outsourcing manufacturing is a common practice for many companies to reduce costs and increase efficiency.

  • Outsourcing can provide access to specialized skills and technology

  • It can also reduce labor costs and overhead expenses

  • However, outsourcing can also lead to quality control issues and communication challenges

  • The cable box manufacturer should carefully evaluate potential outsourcing partners and negotiate clear contracts to ensure quality and timely delivery

Add your answer
right arrow

Q93. Interpretation of Direct tax law

Ans.

Interpretation of direct tax law involves understanding and applying tax regulations to determine tax liabilities.

  • Understanding tax laws and regulations

  • Applying tax laws to determine tax liabilities

  • Interpreting tax codes and guidelines

  • Analyzing tax implications of financial transactions

  • Ensuring compliance with tax laws

Add your answer
right arrow

Q94. Practices to prevent SQLi

Ans.

Practices to prevent SQLi

  • Use parameterized queries or prepared statements

  • Implement input validation and sanitization

  • Apply least privilege principle for database access

  • Regularly update and patch database software

  • Implement a web application firewall (WAF)

  • Perform security testing and code reviews

Add your answer
right arrow

Q95. what are type 1 and type 2 errors, what are independent and mutually exclusive events,

Ans.

Type 1 and type 2 errors are related to statistical hypothesis testing, while independent and mutually exclusive events are concepts in probability theory.

  • Type 1 error occurs when a true null hypothesis is incorrectly rejected, while type 2 error occurs when a false null hypothesis is not rejected.

  • Independent events are events where the occurrence of one event does not affect the probability of the other event happening. Mutually exclusive events are events that cannot occur ...read more

Add your answer
right arrow

Q96. Difference between amortization and depreciation

Ans.

Amortization is for intangible assets while depreciation is for tangible assets.

  • Amortization is the process of spreading the cost of an intangible asset over its useful life.

  • Depreciation is the process of spreading the cost of a tangible asset over its useful life.

  • Amortization is used for assets like patents, copyrights, and trademarks.

  • Depreciation is used for assets like buildings, machinery, and vehicles.

View 1 answer
right arrow

Q97. what is deferred tax

Ans.

Deferred tax is a liability or asset that arises from the difference between accounting income and taxable income.

  • Deferred tax is the tax effect of temporary differences between accounting income and taxable income.

  • It can be a liability if taxable income is greater than accounting income, or an asset if the reverse is true.

  • Examples include depreciation expenses and revenue recognition timing differences.

  • Deferred tax liabilities and assets are reported on the balance sheet.

Add your answer
right arrow

Q98. Have you used SAP or other a like software?

Ans.

Yes, I have used SAP extensively in my previous roles as a consultant.

  • I have experience in implementing and configuring various SAP modules such as FI/CO, MM, SD, and PP.

  • I have also worked on SAP upgrades and migrations.

  • I am familiar with SAP best practices and have provided recommendations to clients based on their business requirements.

  • One of my recent projects involved implementing SAP S/4HANA for a manufacturing client.

  • I have also worked with other ERP systems such as Ora...read more

Add your answer
right arrow

Q99. 3 golden principles of accounting

Ans.

The 3 golden principles of accounting are: 1) Debit the receiver, credit the giver 2) Debit what comes in, credit what goes out 3) Debit expenses and losses, credit income and gains.

  • Debit the receiver, credit the giver: when an asset is received, it is debited and when a liability is given, it is credited

  • Debit what comes in, credit what goes out: when cash is received, it is debited and when cash is paid, it is credited

  • Debit expenses and losses, credit income and gains: when ...read more

Add your answer
right arrow

Q100. How working capital is calculated

Ans.

Working capital is calculated by subtracting current liabilities from current assets.

  • Current assets include cash, accounts receivable, inventory, and short-term investments.

  • Current liabilities include accounts payable, short-term loans, and accrued expenses.

  • The formula for working capital is: Current Assets - Current Liabilities.

  • A positive working capital indicates that a company has enough short-term assets to cover its short-term liabilities.

  • A negative working capital indic...read more

Add your answer
right arrow
1
2
Next
Contribute & help others!
Write a review
Write a review
Share interview
Share interview
Contribute salary
Contribute salary
Add office photos
Add office photos

Interview Process at Deloitte for Freshers

based on 165 interviews
Interview experience
4.2
Good
View more
interview tips and stories logo
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

Oracle Logo
3.7
 • 648 Interview Questions
Lupin Logo
4.2
 • 239 Interview Questions
TCE Logo
3.8
 • 211 Interview Questions
Startek Logo
3.1
 • 180 Interview Questions
ArcelorMittal Nippon Steel Logo
4.1
 • 155 Interview Questions
Hero MotoCorp Logo
4.1
 • 149 Interview Questions
View all
Recently Viewed
SALARIES
Gartner
JOBS
DBS Bank
No Jobs
REVIEWS
Deloitte
No Reviews
SALARIES
Gartner
SALARIES
Lifeworks Wellbeing Solutions India
SALARIES
Gartner
SALARIES
Gartner
SALARIES
Mercer
REVIEWS
Deloitte
No Reviews
REVIEWS
Deloitte
No Reviews
Top Deloitte Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
play-icon
play-icon
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter