
Deloitte


100+ Deloitte Interview Questions and Answers for Freshers
Q1. Guesstimate: ‘How much would a tea seller earn in a year by selling a tea on the roadside joint in Mumbai’
The tea seller in a roadside joint in Mumbai can earn an average annual income of around INR 2,40,000.
The average price of a cup of tea in Mumbai is around INR 10.
Assuming the tea seller sells 100 cups of tea per day, the daily revenue would be INR 1,000.
Considering the tea seller operates 300 days a year, the annual revenue would be INR 3,00,000.
After deducting expenses like rent, ingredients, and wages, the tea seller's net income could be around INR 2,40,000.
Q2. What if you have unlimited budget but only two areas to spend on where will you spend?
Invest in research and development and employee training.
Invest in research and development to drive innovation and stay ahead of competitors.
Allocate funds for employee training and development to enhance skills and expertise.
Examples: Setting up state-of-the-art R&D facilities, hiring top researchers, conducting market research, organizing training programs and workshops.
Q3. Can we debug AMDP and CDS?
Yes, we can debug AMDP and CDS.
We can debug AMDP using ABAP debugger or Eclipse debugger.
We can debug CDS using Eclipse debugger or SQL Trace.
For AMDP, we can set breakpoints in the method and debug it.
For CDS, we can use SQL Trace to analyze the SQL statements generated by CDS view.
Debugging helps in identifying and fixing issues in the code.
Q4. Batch calls in OData, association and navigation in OData?
Batch calls allow multiple requests in a single HTTP call. Associations and navigation allow querying related data in OData.
Batch calls can improve performance by reducing the number of HTTP requests.
Associations define relationships between entities in OData.
Navigation allows querying related entities using the $expand query option.
Example: /Orders?$expand=Customer
Example: /Customers('ALFKI')/Orders
Q5. What is Encapsulation and Polymorphism in OO ABAP?
Encapsulation is the concept of hiding implementation details and exposing only necessary information. Polymorphism is the ability of objects to take on multiple forms.
Encapsulation helps in achieving data security and prevents unauthorized access to data.
Polymorphism allows objects to be treated as instances of their own class or as instances of their parent class.
Encapsulation and Polymorphism are key concepts in Object-Oriented Programming.
Example of Encapsulation: Private...read more
Q6. Can we achieve multiple inheritance in ABAP?
No, ABAP does not support multiple inheritance.
ABAP only supports single inheritance through the use of interfaces and abstract classes.
Multiple inheritance can lead to ambiguity and complexity in the code.
However, ABAP does allow for the implementation of multiple interfaces.
Example: a class can implement both IF_A and IF_B interfaces.
Q7. Can we have multiple constructors for a class?
Yes, a class can have multiple constructors with different parameters.
Constructors are used to initialize objects of a class.
Multiple constructors can be defined with different parameters.
The constructor with the matching parameters is called when an object is created.
Constructors can also call other constructors using 'this' keyword.
Example: public class MyClass { public MyClass() {} public MyClass(int x) {} }
Q8. How do you setup and manager role-based permissions?
Setting up role-based permissions involves defining roles, assigning permissions to roles, and managing user access based on roles.
Define different roles based on job functions or responsibilities
Assign specific permissions to each role, determining what actions users in that role can perform
Grant or revoke access to resources based on roles
Regularly review and update roles and permissions to ensure security and compliance
Use role-based access control (RBAC) to streamline per...read more
Q9. What are business rules constructed using?
Business rules are constructed using logic and conditions.
Logic
Conditions
Constraints
Decision tables
Rule engines
Q10. CASE STUDIE:- CALCULATE REVENUE OF ICE CREAM PARLOUR
To calculate revenue of an ice cream parlor, we need to consider factors like sales volume, pricing strategy, and operational costs.
Determine the average number of customers per day and the average amount spent per customer
Consider the cost of ingredients, labor, rent, and utilities
Analyze the competition and adjust pricing strategy accordingly
Explore opportunities for upselling and cross-selling
Track sales and expenses regularly to identify trends and make informed decisions
Q11. New technology in the field of semiconductor industry?
The semiconductor industry is constantly evolving with new technologies such as AI, IoT, and 5G driving innovation.
AI is being used to improve chip design and manufacturing processes
IoT is driving demand for low-power and high-performance chips
5G is increasing demand for high-speed and low-latency chips
Emerging technologies such as quantum computing and neuromorphic computing are being explored for future applications
Q12. Do SWOT analysis of your company.
SWOT analysis of our company reveals strengths in brand recognition and customer loyalty, weaknesses in limited product offerings, opportunities in expanding into new markets, and threats from increasing competition.
Strengths: strong brand recognition, high customer loyalty, experienced management team
Weaknesses: limited product offerings, lack of diversification, dependence on a few key suppliers
Opportunities: expanding into new markets, developing new products, strategic pa...read more
Q13. What controls have you worked on
I have worked on implementing financial controls in a corporate setting.
Implemented segregation of duties to prevent fraud
Developed approval processes for financial transactions
Established monitoring mechanisms to detect anomalies
Created documentation for control procedures
Q14. What is Risk and control matrix
Risk and control matrix is a tool used to identify, assess, and manage risks within an organization.
It outlines potential risks faced by the organization
It identifies existing controls in place to mitigate those risks
It helps in evaluating the effectiveness of the controls
It assists in prioritizing risks based on their impact and likelihood
It is commonly used in risk management and internal audit processes
Q15. New technologies in the field of manufacturing.
New technologies are revolutionizing manufacturing, from automation to 3D printing.
Automation and robotics are increasing efficiency and reducing costs.
Additive manufacturing, such as 3D printing, is allowing for more customization and faster prototyping.
Artificial intelligence and machine learning are improving quality control and predictive maintenance.
Internet of Things (IoT) devices are enabling real-time monitoring and optimization of production processes.
Augmented and v...read more
Q16. Reverse a Number Problem Statement
Given an integer 'N', write a program to generate the reverse of the number and print the resulting reversed number.
The reversed number should not include any leading zeros t...read more
Reverse a given integer and remove leading zeros.
Iterate through the digits of the number from right to left and build the reversed number.
Skip any leading zeros in the reversed number.
Ensure the reversed number does not exceed the constraints of 0 <= N < 10^8.
Q17. Annotations used in CDS?
Annotations are used in CDS to define metadata and behavior of entities and fields.
Annotations are defined using the @ symbol followed by the annotation name
Annotations can be used to define metadata such as labels, descriptions, and visibility
Annotations can also be used to define behavior such as validation rules and default values
Examples of annotations include @Label, @Description, @Validation.rule, and @Default
Q18. Cardinality in Odata and CDS?
Cardinality defines the relationship between entities in OData and CDS.
Cardinality in OData is defined using navigation properties and can be one-to-one, one-to-many, or many-to-many.
In CDS, cardinality is defined using associations and can be one-to-one, one-to-many, or many-to-many.
Cardinality can be specified using symbols such as *, 1, or n.
For example, a one-to-many relationship between a customer and their orders would have a cardinality of 1:n.
Q19. BUSINESS FACTORS IMPACTINF ANY INDUSTRY
Business factors affecting any industry include economic conditions, competition, technology, and government regulations.
Economic conditions such as inflation, recession, and interest rates can impact the industry's growth and profitability.
Competition from existing and new players can affect market share and pricing strategies.
Technology advancements can disrupt traditional business models and create new opportunities.
Government regulations such as taxes, tariffs, and trade ...read more
Q20. Who regulates Markets in US? Responsibilities of their Market regulator?
The Securities and Exchange Commission (SEC) regulates markets in the US. Their responsibilities include enforcing federal securities laws, protecting investors, and maintaining fair and orderly markets.
The SEC is responsible for overseeing securities exchanges such as the New York Stock Exchange (NYSE) and NASDAQ.
They enforce laws such as the Securities Act of 1933 and the Securities Exchange Act of 1934.
The SEC also regulates investment advisers, mutual funds, and other inv...read more
Q21. How to find Largest element in the array wid most efficiency?
Use a loop to iterate through the array and keep track of the largest element.
Initialize a variable to store the largest element as the first element of the array
Loop through the array and compare each element to the current largest element
If the current element is larger, update the largest element variable
Return the largest element variable
Q22. You know Normalizastion? Tell me what is 3rd normal form
3rd normal form is a database normalization technique where every non-key attribute is dependent on the primary key.
In 3NF, there should be no transitive dependencies between non-key attributes.
It reduces data redundancy and improves data integrity.
Example: A table with columns for customer ID, order ID, and product ID. The product name should not be stored in this table as it is dependent on the product ID, not the customer or order ID.
Another example: A table with columns f...read more
Q23. What is Close-Ended Mutual Fund?
A mutual fund with a fixed number of shares, traded on an exchange like a stock.
Investors buy and sell shares of the fund on the exchange
The price of the shares is determined by supply and demand
The fund is managed by a professional portfolio manager
Examples include index funds and ETFs
Q24. What is a stock and a bond?
A stock is a share of ownership in a company, while a bond is a debt security issued by a company or government.
Stocks represent ownership in a company and give shareholders voting rights and potential dividends.
Bonds represent a loan to a company or government and pay interest to the bondholder.
Stocks are generally considered riskier but offer higher potential returns, while bonds are considered safer but offer lower returns.
Investors often use a combination of stocks and bo...read more
Q25. On resume- difference between html5 and its previous version?
HTML5 introduced new features like canvas, video, audio, and semantic elements compared to its previous version.
HTML5 introduced new semantic elements like <header>, <footer>, <nav>, <article>, <section> for better structure and accessibility.
HTML5 added support for audio and video elements without the need for plugins, making multimedia integration easier.
HTML5 introduced the <canvas> element for drawing graphics and animations directly on the web page.
HTML5 brought improvem...read more
Q26. code to print largest number, code to find prime number
Code to print largest number and find prime number.
For printing largest number, initialize a variable with the first element of the array and loop through the array to compare each element with the variable. If the element is greater than the variable, update the variable with the element.
For finding prime number, loop through the numbers from 2 to n-1 and check if n is divisible by any of them. If n is divisible by any number, it is not a prime number.
To optimize prime numbe...read more
Q27. who are the clients of Deloitte?
Deloitte's clients are diverse and include businesses, governments, and non-profit organizations.
Deloitte serves clients in various industries such as healthcare, financial services, technology, and consumer products.
Their clients range from small startups to large multinational corporations.
They also work with government agencies and non-profit organizations.
Examples of their clients include Amazon, Coca-Cola, and the United States Department of Defense.
Q28. What do you know about conditional loop
Conditional loop is a loop that executes a block of code repeatedly as long as a specified condition is true.
Conditional loop is used to iterate over a block of code multiple times based on a condition.
The loop will continue to execute as long as the specified condition remains true.
Common examples of conditional loops include 'while' and 'for' loops in programming languages.
Q29. How do you handle internal conflicts?
I address internal conflicts by promoting open communication, active listening, and seeking common ground.
Encourage open communication to understand all perspectives
Practice active listening to show empathy and respect
Seek common ground and compromise to resolve conflicts peacefully
Q30. What is monolithic andmicroservices
Monolithic architecture is a single-tiered software application where all components are tightly coupled, while microservices architecture is a distributed approach where the application is broken down into smaller, independent services.
Monolithic architecture: all components are tightly coupled in a single-tiered application
Microservices architecture: application is broken down into smaller, independent services
Monolithic architecture can be harder to scale and maintain
Micro...read more
Q31. What is sql how it works
SQL is a programming language used for managing and manipulating relational databases.
SQL stands for Structured Query Language
It is used to communicate with databases to perform tasks such as querying data, updating data, and creating tables
SQL statements are written in a specific syntax and can be used to retrieve specific data from a database
Examples of SQL commands include SELECT, INSERT, UPDATE, and DELETE
Q32. Sort employee by name using java8
Use Java 8 streams and lambda expressions to sort a list of employees by name.
Create a list of Employee objects with names.
Use stream() method to convert the list to a stream.
Use sorted() method with Comparator.comparing() to sort by name.
Collect the sorted stream back to a list.
Q33. Write a program to find biggest of 3
Program to find the biggest of 3 numbers
Create a function that takes in 3 numbers as input
Compare the numbers to find the biggest one
Return the biggest number as output
Q34. Different businesses of Deloitte
Deloitte offers a range of services across various industries including audit, consulting, tax, and advisory.
Audit and Assurance
Consulting
Tax
Advisory
Financial Advisory
Risk Advisory
Technology Consulting
Human Capital
Strategy and Operations
Mergers and Acquisitions
Analytics and Cognitive
Cybersecurity
Supply Chain and Manufacturing Operations
Real Estate
Government and Public Services
Life Sciences and Healthcare
Consumer and Industrial Products
Energy and Resources
Financial Services
Q35. What are some of weaknesses
Some weaknesses include perfectionism, difficulty delegating tasks, and lack of public speaking skills.
Perfectionism can lead to spending too much time on tasks and missing deadlines
Difficulty delegating tasks can result in feeling overwhelmed and not utilizing team members effectively
Lack of public speaking skills may hinder effective communication and presentation of ideas
Q36. What are joins
Joins are used to combine data from two or more tables based on a related column.
Joins are used in SQL to retrieve data from multiple tables.
There are different types of joins such as inner join, left join, right join, and full outer join.
The join condition is specified using the ON keyword and the related columns.
Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column;
Q37. Execution order of sql operations
SQL operations are executed in the following order: FROM, WHERE, GROUP BY, HAVING, SELECT, ORDER BY.
FROM clause is executed first to retrieve data from tables
WHERE clause filters the data based on specified conditions
GROUP BY groups the data based on specified columns
HAVING filters the grouped data
SELECT selects the columns to be displayed
ORDER BY sorts the final result set
Q38. What is immutable
An immutable object is an object whose state cannot be modified after it is created.
Immutable objects are often used in functional programming to ensure data integrity.
Examples of immutable objects include String, Integer, and Tuple in Python.
Immutable objects are thread-safe and can be shared across multiple threads without the risk of data corruption.
Q39. System design of university
The system design for a university involves various components such as student information systems, course management systems, and communication platforms.
Student information systems to manage student records, registration, and academic progress
Course management systems for scheduling classes, assigning instructors, and tracking grades
Communication platforms for students, faculty, and staff to interact and share information
Integration of learning management systems for online...read more
Q40. If you are given an array of 6 numbers 123345 give the logic for finding the duplicate numbers in this array Other technical questions where purely based on what we say previously. When I talked about my course...
read moreLogic to find duplicate numbers in an array of 6 numbers
Iterate through the array and compare each element with the rest of the elements
If a match is found, print the duplicate number
Use nested loops to compare all elements
Alternatively, use a hash table to keep track of seen elements
Q41. Suppose there is a room in the office and X people enter room throughout the day, Y people leave throughout the day [continuously people are entering the room, some are staying there, and rest are going out] .....
read moreCode to calculate number of people in a room at EOD given X enter and Y leave throughout the day.
Create a variable to keep track of the current number of people in the room
Increment the variable by X every time someone enters the room
Decrement the variable by Y every time someone leaves the room
Return the final value of the variable at the end of the day
Example: If 10 people enter and 5 leave, there will be 5 people in the room at EOD
Q42. Is Javascript a single/multi threaded language? If single threaded then how does backend calls work?
Javascript is a single-threaded language, but it can handle asynchronous operations through callbacks and promises.
Javascript is single-threaded, meaning it can only execute one task at a time.
However, it can handle asynchronous operations by using callbacks, promises, and async/await.
Backend calls in Javascript are typically made using asynchronous functions, allowing the program to continue executing other tasks while waiting for the response.
For example, when making an HTT...read more
Q43. What is useEffect Hook? What are dependency arrays wrt useEffect?
useEffect Hook is a built-in hook in React that allows you to perform side effects in functional components.
useEffect Hook is used to handle side effects in functional components, such as fetching data, subscribing to events, or manipulating the DOM.
It takes two arguments: a function that represents the side effect, and an optional dependency array.
The function passed to useEffect will be executed after every render, unless the dependency array is provided.
The dependency arra...read more
Q44. What are the different LifeCycle Methods of React?
React has three main lifecycle methods: Mounting, Updating, and Unmounting.
Mounting: These methods are called when an instance of a component is being created and inserted into the DOM.
Updating: These methods are called when a component is being re-rendered as a result of changes to either its props or state.
Unmounting: This method is called when a component is being removed from the DOM.
Q45. Sort 0 and 1 Problem Statement
Given an integer array ARR
of size N
containing only integers 0 and 1, implement a function to sort this array. The solution should scan the array only once without using any addi...read more
The function sorts an integer array containing only 0s and 1s in linear time complexity.
Use two pointers, one starting from the beginning and the other from the end of the array.
Swap the elements at the pointers if the element at the beginning pointer is 1 and the element at the end pointer is 0.
Continue moving the pointers towards each other until they meet in the middle of the array.
Q46. What are the different hooks in React?
React hooks are functions that allow you to use state and other React features in functional components.
useState() - for managing state in functional components
useEffect() - for performing side effects in functional components
useContext() - for accessing context in functional components
useReducer() - for managing complex state and actions in functional components
useCallback() - for memoizing functions in functional components
useMemo() - for memoizing values in functional comp...read more
Q47. Name different package managers of Node JS and Javascript
npm is the most popular package manager for Node.js and JavaScript.
npm (Node Package Manager) is the default package manager for Node.js and JavaScript.
Yarn is an alternative package manager that offers faster and more reliable dependency management.
pnpm is another package manager that uses a unique approach of hard-linking dependencies to save disk space.
Bower is a package manager specifically designed for front-end web development.
NPM Enterprise is a paid package manager wi...read more
Q48. Find K'th Character of Decrypted String
You are given an encrypted string where repeated substrings are represented by the substring followed by its count. Your task is to find the K'th character of the decrypt...read more
Given an encrypted string with repeated substrings represented by counts, find the K'th character of the decrypted string.
Parse the encrypted string to extract substrings and their counts
Iterate through the substrings and counts to build the decrypted string
Track the position in the decrypted string to find the K'th character
Q49. How javascript runs on servers?
JavaScript can run on servers using server-side JavaScript platforms like Node.js.
JavaScript can be executed on servers using server-side JavaScript platforms like Node.js.
Node.js allows JavaScript to run on the server-side by providing a runtime environment.
Server-side JavaScript enables developers to build scalable and high-performance web applications.
Node.js uses the V8 JavaScript engine to execute JavaScript code on the server.
Server-side JavaScript can handle tasks such...read more
Q50. Convert BST to Greater Sum Tree
Given a Binary Search Tree (BST) of integers, your task is to convert it into a greater sum tree. In the greater sum tree, each node's value should be replaced with the sum of al...read more
The task is to convert a Binary Search Tree into a Greater Sum Tree.
Traverse the BST in reverse inorder (right, root, left) to visit nodes in descending order.
Keep track of the sum of all greater nodes encountered so far.
Update the value of each node by adding the sum of greater nodes and update the sum.
Continue this process until all nodes have been visited.
Return the modified BST.
Q51. Pair Sum Problem Statement
You are provided with an array ARR
consisting of N
distinct integers in ascending order and an integer TARGET
. Your objective is to count all the distinct pairs in ARR
whose sum equal...read more
Count distinct pairs in an array whose sum equals a given target.
Use two pointers approach to iterate through the array and find pairs with sum equal to target.
Keep track of visited pairs to avoid counting duplicates.
Return -1 if no such pair exists with the given target.
Q52. Sort 0 1 2 Problem Statement
Given an integer array arr
of size 'N' containing only 0s, 1s, and 2s, write an algorithm to sort the array.
Input:
The first line contains an integer 'T' representing the number of...read more
Sort an array of 0s, 1s, and 2s in linear time complexity.
Use three pointers to keep track of the positions of 0s, 1s, and 2s in the array.
Iterate through the array and swap elements based on the values encountered.
Maintain left pointer for 0s, right pointer for 2s, and current pointer for traversal.
Example: If current element is 0, swap it with element at left pointer and increment both pointers.
Q53. Cycle Detection in Undirected Graph Problem Statement
You are provided with an undirected graph containing 'N' vertices and 'M' edges. The vertices are numbered from 1 to 'N'. Your objective is to determine whe...read more
Detect if an undirected graph contains a cycle.
Use Depth First Search (DFS) to traverse the graph and detect cycles.
Maintain a visited array to keep track of visited vertices.
If a visited vertex is encountered again during DFS, a cycle exists.
Check for back edges while traversing the graph.
Consider disconnected graphs as well.
Q54. Next Smaller Palindrome Problem Statement
You are given a palindrome number represented as a string S
. Your task is to find the largest palindrome number that is strictly less than S
.
Example:
Input:
T = 2
S1 = ...read more
Given a palindrome number represented as a string, find the largest palindrome number that is strictly less than the given number.
Iterate from the middle towards the start and end of the string to find the next smaller palindrome.
If the number is odd in length, simply mirror the left half to the right half to get the next smaller palindrome.
If the number is even in length, decrement the middle digit and mirror the left half to the right half to get the next smaller palindrome...read more
Q55. Longest Common Subsequence Problem Statement
Given two strings STR1
and STR2
, determine the length of their longest common subsequence.
A subsequence is a sequence that can be derived from another sequence by d...read more
The problem involves finding the length of the longest common subsequence between two given strings.
Use dynamic programming to solve this problem efficiently.
Create a 2D array to store the lengths of common subsequences of substrings.
Iterate through the strings to fill the array and find the length of the longest common subsequence.
Example: For input STR1 = 'abcde' and STR2 = 'ace', the longest common subsequence is 'ace' with a length of 3.
Q56. Boundary Traversal of a Binary Tree
Given a binary tree of integers, your task is to output the boundary nodes of this binary tree in Anti-Clockwise order, starting from the root node.
Explanation:
The boundary...read more
Output the boundary nodes of a binary tree in Anti-Clockwise order, starting from the root node.
Traverse the left boundary nodes in top-down order
Traverse the leaf nodes from left to right
Traverse the right boundary nodes in bottom-up order
Combine the above traversals to get the boundary nodes in Anti-Clockwise order
Q57. How good are you in java
I am proficient in Java with experience in developing various applications.
I have been working with Java for over 5 years
I have developed multiple applications using Java, including a web-based inventory management system
I am familiar with various Java frameworks such as Spring and Hibernate
I keep myself updated with the latest Java technologies and trends
Q58. Search an Element in a Sorted Array
Given a sorted array 'A' of 'N' integers, determine whether a number 'X' exists within this array for a series of queries. For each query, print 1 if 'X' exists in the array,...read more
Search for a number in a sorted array and determine its existence for multiple queries.
Use binary search algorithm to efficiently search for each query integer in the sorted array.
For each query integer 'X', check if it exists in the array 'A' and output 1 if found, 0 otherwise.
Ensure the array 'A' is sorted in non-decreasing order to apply binary search effectively.
Q59. Case : I am a US based company and I sell 3 products A, B, C (I don’t rem exact name) and I am having losses. I assume the reason for facing losses can be either economic downturn, new competitors, or internal...
read moreThe exact reason for facing losses cannot be determined without further analysis.
Further analysis is needed to identify the root cause of the losses.
Economic downturn, new competitors, and internal problems are all potential factors.
Examples of internal problems could include poor management, inefficient processes, or high overhead costs.
Q60. How to find the minimum number from a given set of numbers ?
To find the minimum number from a set of numbers, compare each number with the others and select the smallest.
Compare each number with the others in the set
Select the smallest number as the minimum
Q61. Knowledge Management is a growing field. You are a smaller company going up against a more established one. What would you do?
Establish a niche and focus on personalized service to differentiate from the larger company.
Identify a specific area of knowledge management where the larger company may not be as strong
Offer personalized service and tailored solutions to clients
Leverage technology to streamline processes and improve efficiency
Build a strong online presence through social media and content marketing
Partner with other smaller companies to offer a wider range of services
Q62. What are joins and name one case where you applied it?
Joins are used to combine data from two or more tables based on a related column.
Joins are used in SQL to retrieve data from multiple tables.
Common types of joins include inner join, left join, right join, and full outer join.
One case where I applied joins was when I needed to retrieve customer information and their corresponding orders from two separate tables.
Another example is when I needed to combine data from a table of employees and a table of departments to determine w...read more
Q63. Bursting Balloons Problem
Given an array ARR
of size N
, where each element represents the height of a balloon. The task is to destroy all balloons by shooting arrows from left to right. When an arrow hits a bal...read more
To burst all balloons by shooting arrows from left to right, determine the minimum number of arrows needed.
Iterate through the array and keep track of the maximum height of balloons that can be burst with one arrow.
Increment the arrow count whenever a balloon height exceeds the maximum height.
Return the total arrow count needed to burst all balloons.
Q64. What are 5 heads of income? What is depreciation and types? What is accrued interest?
The 5 heads of income are salary, house property, business/profession, capital gains, and other sources.
Salary income includes income from employment
House property income includes rental income
Business/profession income includes income from self-employment
Capital gains income includes profits from sale of assets
Other sources income includes income from sources not covered under the other heads
Depreciation is the decrease in value of an asset over time
Types of depreciation inc...read more
Q65. What do you know about tax? Cost accounting vs managerial accounting?
Tax is a mandatory financial charge imposed by the government on individuals and businesses.
Tax is used to fund public services and infrastructure
There are different types of taxes such as income tax, sales tax, property tax, etc.
Tax laws and regulations vary by country and jurisdiction
Cost accounting is focused on determining the cost of producing a product or service
Managerial accounting is focused on providing financial information to help managers make business decisions
B...read more
Q66. Are flexible with relocation
Yes, I am flexible with relocation.
I am open to exploring new opportunities in different locations.
I understand that relocation may be necessary for career growth.
I am willing to consider all options and make a decision based on what is best for the company and my career.
I have relocated in the past for work and am familiar with the process.
I am excited about the possibility of experiencing new places and cultures.
Q67. A big multinational computer($8 billion)hardware and software services company is planning to de-merge its business into two units -hardware business and software services / consulting business. After the de-me...
read moreThe strategy for the division of IT systems in the de-merger of the multinational computer hardware and software services company.
For Applications: Evaluate the criticality and interdependencies of each application, prioritize based on business needs, and allocate resources accordingly.
For Data Centers: Assess the capacity and redundancy requirements of each unit, consolidate or establish new data centers as needed, and ensure seamless transition of data and services.
For Test...read more
Q68. What do you think telecom operators should do to prevent this problem?
Telecom operators should invest in robust network infrastructure and implement strict security measures to prevent problems.
Invest in upgrading network infrastructure to handle increasing data traffic
Implement strong security measures to protect against cyber threats
Regularly monitor and analyze network performance to identify and address potential issues
Provide reliable customer support to promptly address customer complaints and concerns
Offer competitive pricing and attract...read more
Q69. A Telecommunication giant has been mandated by the Indonesia government to provide internet services to all the residents of the country. The company is already a player in the market, providing other services...
read moreAs a Deloitte consultant, I would proceed by conducting a feasibility study and developing a comprehensive strategy.
Conduct a feasibility study to assess the current infrastructure and identify gaps
Develop a comprehensive strategy that includes network expansion, technology upgrades, and partnerships with local providers
Establish a project management team to oversee the implementation of the strategy
Engage with stakeholders, including government officials, to ensure complianc...read more
Q70. Items to add in balancesheet right after trial balace.
Items to add in balancesheet after trial balance
Accrued expenses
Prepaid expenses
Depreciation
Deferred revenue
Accrued interest
Goodwill
Intangible assets
Long-term investments
Long-term debt
Shareholder's equity
Q71. How good are you with SQL?
I am proficient in SQL and have experience in writing complex queries.
Proficient in writing complex queries
Experience in working with large databases
Familiarity with various SQL functions and operators
Ability to optimize queries for better performance
Q72. Explain following vulnerabilities 1. IDOR 2. Types of XSS 3. SQLi
IDOR is Insecure Direct Object Reference, XSS is Cross-Site Scripting, and SQLi is SQL Injection.
IDOR occurs when an application allows direct access to internal objects without proper authorization.
XSS refers to injecting malicious scripts into web pages viewed by other users, compromising their security.
SQLi is a technique where an attacker inserts malicious SQL code into a query, manipulating the database.
Example of IDOR: Accessing another user's private data by modifying ...read more
Q73. Find vulnerabilities in a simulated network and prepare a VAPT report.
To find vulnerabilities in a simulated network and prepare a VAPT report.
Conduct a vulnerability assessment using tools like Nessus, OpenVAS, etc.
Identify vulnerabilities and their severity levels
Prepare a detailed report with recommendations for remediation
Include an executive summary for non-technical stakeholders
Q74. Journal entry for provision for doubtful debt
A provision for doubtful debt is a journal entry made to account for potential losses from customers who may not pay their debts.
Provision for doubtful debt is recorded as an expense in the income statement.
It is created by debiting the provision for doubtful debt account and crediting the bad debt expense account.
The provision is based on an estimate of the amount of debt that is likely to become uncollectible.
The provision is usually a percentage of the accounts receivable ...read more
Q75. Differance between leadership and managemnt.
Leadership is about inspiring and guiding a team towards a common goal, while management is about planning, organizing, and controlling resources to achieve that goal.
Leadership focuses on people, while management focuses on processes and systems.
Leadership is about setting a vision and motivating others to work towards it, while management is about ensuring that the necessary resources are in place to achieve that vision.
Leadership involves taking risks and being innovative,...read more
Q76. Draft 5 observation along with risk and implications
Observations, risks, and implications for an Assistant Manager role
Observation 1: Lack of clear communication among team members
Risk 1: Misunderstandings leading to errors in tasks
Implication 1: Decreased productivity and potential conflicts within the team
Observation 2: High employee turnover rate
Risk 2: Difficulty in maintaining a stable and experienced team
Implication 2: Increased recruitment and training costs, impact on team morale
Observation 3: Inconsistent adherence to...read more
Q77. How will you merge two CSV file with left joint in python
Merging two CSV files with left join in Python.
Read both CSV files using pandas.
Perform left join using merge() function.
Save the merged data to a new CSV file.
Q78. Explain your projects !! Which Programming languages do u know ? Write a program of your choice in your preferred programming language !! What are your long term goals ? What are your preferred technologies ?
I have worked on multiple projects using various programming languages. My long term goal is to become a data analyst and my preferred technologies are Python and SQL.
Projects: E-commerce website using PHP, Inventory management system using Java, Data analysis of customer behavior using Python
Programming languages: Python, Java, PHP, SQL
Program: Python program to calculate the factorial of a number
Long term goal: To become a data analyst
Preferred technologies: Python and SQL
Q79. Scenario how to create 1 to 1 relationship
To create a 1 to 1 relationship in Salesforce, use a lookup field on the child object pointing to the parent object.
Create a lookup field on the child object that references the parent object.
Ensure that the lookup field has a unique constraint to enforce the 1 to 1 relationship.
Use validation rules or triggers to prevent multiple child records from being linked to the same parent record.
Q80. Tell me about different type of risks
Different types of risks include financial risk, operational risk, strategic risk, compliance risk, and reputational risk.
Financial risk: Risk related to financial markets, such as market risk, credit risk, and liquidity risk.
Operational risk: Risk of loss resulting from inadequate or failed internal processes, people, and systems.
Strategic risk: Risk related to the organization's long-term goals and objectives, such as competition and market changes.
Compliance risk: Risk of ...read more
Q81. Diff b/w authorisation and authentication
Authorization is the process of granting access to a resource, while authentication is the process of verifying the identity of a user.
Authorization determines what a user can do with a resource, while authentication verifies who the user is.
Authorization is based on permissions and roles, while authentication is based on credentials such as username and password.
Examples of authorization include granting access to a file or database, while examples of authentication include ...read more
Q82. Can you guess the reason behind call drops?
Call drops can be caused by various factors such as network congestion, poor signal strength, and technical issues.
Network congestion due to high call volume or limited bandwidth
Poor signal strength caused by distance from cell tower or obstacles
Technical issues such as software glitches or hardware malfunctions
Interference from other electronic devices
Inadequate network coverage in certain areas
User error such as accidentally hanging up or losing signal
Weather conditions suc...read more
Q83. what all changes are there from AS to IND-AS in IND-AS 116
Changes from AS to IND-AS in IND-AS 116
AS 19 and IND-AS 116 are similar but IND-AS 116 has some changes
AS 19 allowed two methods of accounting for leases, while IND-AS 116 only allows one
IND-AS 116 requires lessees to recognize all leases on their balance sheet
IND-AS 116 requires lessors to classify leases as either operating or finance leases
IND-AS 116 requires additional disclosures in the financial statements
Q84. Describe sql commands and basic dsa question
SQL commands are used to interact with databases, while DSA questions test problem-solving skills.
SQL commands include SELECT, INSERT, UPDATE, DELETE for querying and modifying data in databases
Basic DSA questions may involve sorting algorithms, data structures like arrays, linked lists, trees
Understanding of time complexity, space complexity, and problem-solving strategies is important
Q85. Difference between current and non current in balance sheet
Current assets/liabilities are expected to be used/settled within a year, while non-current assets/liabilities have a longer life span.
Current assets include cash, accounts receivable, inventory, and prepaid expenses.
Current liabilities include accounts payable, short-term loans, and accrued expenses.
Non-current assets include property, plant, and equipment, long-term investments, and intangible assets.
Non-current liabilities include long-term loans, deferred tax liabilities,...read more
Q86. How the act is enacted
The act is enacted through a series of steps and procedures to ensure compliance and implementation.
The act is typically passed by a legislative body, such as a parliament or congress.
It may involve the creation of regulations and guidelines to clarify the intent of the act.
Enforcement mechanisms are put in place to ensure compliance with the act.
Monitoring and evaluation processes are often established to assess the effectiveness of the act.
Amendments or revisions may be mad...read more
Q87. Diff b/w encryption and hashing
Encryption is reversible while hashing is irreversible.
Encryption is the process of converting plain text into cipher text using an algorithm and a key.
Hashing is the process of converting plain text into a fixed-length string of characters using a hash function.
Encryption can be decrypted using a key while hashing cannot be reversed.
Encryption is used to protect data while hashing is used to verify data integrity.
Examples of encryption include AES, RSA, and DES while example...read more
Q88. difference between agile and waterfall methodology of development (methods used in IT industry)
Agile is iterative and flexible, while waterfall is linear and rigid.
Agile focuses on delivering working software in short iterations
Waterfall follows a sequential approach with distinct phases
Agile encourages collaboration and adaptability
Waterfall emphasizes planning and documentation
Agile is better suited for complex and uncertain projects
Waterfall is better suited for projects with well-defined requirements
Examples of agile methodologies include Scrum and Kanban
Examples o...read more
Q89. Assertions and procedure for audit of debtors
Assertions and procedures for auditing debtors
The existence assertion: ensuring that the debtors actually exist and are valid
The completeness assertion: ensuring that all debtors are included in the financial statements
The valuation assertion: ensuring that the debtors are valued correctly
The rights and obligations assertion: ensuring that the company has the right to collect the debt and that the debtors have an obligation to pay
The cutoff assertion: ensuring that all transa...read more
Q90. Explain about the given html command.
The given HTML command is used to create a hyperlink in a webpage.
The <a> tag is used to define a hyperlink in HTML.
The href attribute specifies the URL of the page the link goes to.
Text between the opening and closing <a> tags is the clickable text of the link.
Q91. who is the rbi governor
Shaktikanta Das is the current RBI Governor.
Shaktikanta Das was appointed as the 25th Governor of the Reserve Bank of India in December 2018.
He has previously served as the Economic Affairs Secretary and Revenue Secretary of India.
As RBI Governor, he has focused on maintaining financial stability and supporting economic growth.
Q92. A cable box manufacturer wants to outsource manufacturing
Outsourcing manufacturing is a common practice for many companies to reduce costs and increase efficiency.
Outsourcing can provide access to specialized skills and technology
It can also reduce labor costs and overhead expenses
However, outsourcing can also lead to quality control issues and communication challenges
The cable box manufacturer should carefully evaluate potential outsourcing partners and negotiate clear contracts to ensure quality and timely delivery
Q93. Interpretation of Direct tax law
Interpretation of direct tax law involves understanding and applying tax regulations to determine tax liabilities.
Understanding tax laws and regulations
Applying tax laws to determine tax liabilities
Interpreting tax codes and guidelines
Analyzing tax implications of financial transactions
Ensuring compliance with tax laws
Q94. Practices to prevent SQLi
Practices to prevent SQLi
Use parameterized queries or prepared statements
Implement input validation and sanitization
Apply least privilege principle for database access
Regularly update and patch database software
Implement a web application firewall (WAF)
Perform security testing and code reviews
Q95. what are type 1 and type 2 errors, what are independent and mutually exclusive events,
Type 1 and type 2 errors are related to statistical hypothesis testing, while independent and mutually exclusive events are concepts in probability theory.
Type 1 error occurs when a true null hypothesis is incorrectly rejected, while type 2 error occurs when a false null hypothesis is not rejected.
Independent events are events where the occurrence of one event does not affect the probability of the other event happening. Mutually exclusive events are events that cannot occur ...read more
Q96. Difference between amortization and depreciation
Amortization is for intangible assets while depreciation is for tangible assets.
Amortization is the process of spreading the cost of an intangible asset over its useful life.
Depreciation is the process of spreading the cost of a tangible asset over its useful life.
Amortization is used for assets like patents, copyrights, and trademarks.
Depreciation is used for assets like buildings, machinery, and vehicles.
Q97. what is deferred tax
Deferred tax is a liability or asset that arises from the difference between accounting income and taxable income.
Deferred tax is the tax effect of temporary differences between accounting income and taxable income.
It can be a liability if taxable income is greater than accounting income, or an asset if the reverse is true.
Examples include depreciation expenses and revenue recognition timing differences.
Deferred tax liabilities and assets are reported on the balance sheet.
Q98. Have you used SAP or other a like software?
Yes, I have used SAP extensively in my previous roles as a consultant.
I have experience in implementing and configuring various SAP modules such as FI/CO, MM, SD, and PP.
I have also worked on SAP upgrades and migrations.
I am familiar with SAP best practices and have provided recommendations to clients based on their business requirements.
One of my recent projects involved implementing SAP S/4HANA for a manufacturing client.
I have also worked with other ERP systems such as Ora...read more
Q99. 3 golden principles of accounting
The 3 golden principles of accounting are: 1) Debit the receiver, credit the giver 2) Debit what comes in, credit what goes out 3) Debit expenses and losses, credit income and gains.
Debit the receiver, credit the giver: when an asset is received, it is debited and when a liability is given, it is credited
Debit what comes in, credit what goes out: when cash is received, it is debited and when cash is paid, it is credited
Debit expenses and losses, credit income and gains: when ...read more
Q100. How working capital is calculated
Working capital is calculated by subtracting current liabilities from current assets.
Current assets include cash, accounts receivable, inventory, and short-term investments.
Current liabilities include accounts payable, short-term loans, and accrued expenses.
The formula for working capital is: Current Assets - Current Liabilities.
A positive working capital indicates that a company has enough short-term assets to cover its short-term liabilities.
A negative working capital indic...read more
More about working at Deloitte




Top HR Questions asked in Deloitte for Freshers
Interview Process at Deloitte for Freshers

Top Interview Questions from Similar Companies








Reviews
Interviews
Salaries
Users/Month

