
Deloitte


1500+ Deloitte Interview Questions and Answers
Q101. Which development methodology is used water fall or agile
It depends on the project requirements and team preferences.
Waterfall is a linear approach while Agile is iterative.
Waterfall is best suited for projects with well-defined requirements.
Agile is best suited for projects with changing requirements.
Waterfall requires extensive planning upfront while Agile focuses on adaptability.
Examples of companies using Agile include Spotify and Google.
Examples of companies using Waterfall include NASA and the military.
Q102. Two VM's are running on differenct host how they are communicating.
VMs communicate through network protocols and virtual switches.
VMs use network protocols like TCP/IP to communicate.
Virtual switches connect VMs to the physical network.
Hosts can also use virtual network adapters to communicate with VMs.
Firewalls and security policies can restrict VM communication.
Examples of virtual switches include VMware vSwitch and Hyper-V Virtual Switch.
Q103. Batch calls in OData, association and navigation in OData?
Batch calls allow multiple requests in a single HTTP call. Associations and navigation allow querying related data in OData.
Batch calls can improve performance by reducing the number of HTTP requests.
Associations define relationships between entities in OData.
Navigation allows querying related entities using the $expand query option.
Example: /Orders?$expand=Customer
Example: /Customers('ALFKI')/Orders
Q104. Difference between synchrounous and asynchronous processes in nodejs
Synchronous processes block the execution until completion, while asynchronous processes allow the program to continue executing without waiting.
Synchronous processes wait for a task to finish before moving on to the next one.
Asynchronous processes allow multiple tasks to be executed simultaneously.
Node.js uses asynchronous processes to handle I/O operations efficiently.
Example: Reading a file synchronously will block the program until the file is fully read, while reading it...read more
Q105. What is functional testing and its types ?
Functional testing is a type of testing that verifies if the software meets the specified requirements.
It focuses on the functionality of the software
It is performed to ensure that the software meets the business requirements
Types of functional testing include unit testing, integration testing, system testing, and acceptance testing
Examples of functional testing tools include Selenium, HP QuickTest Professional, and IBM Rational Functional Tester
Q106. What are the things which we need to be aware before we start migrating monolith into microservices
Considerations before migrating monolith into microservices
Understand the current monolith architecture and dependencies
Identify the boundaries for microservices and plan the decomposition
Ensure proper testing and monitoring strategies are in place
Address data management and consistency challenges
Prepare for potential performance overhead and increased complexity
Q107. How do you do reports, and how do you consolidate reports from different sources?
I use a standardized format for reports and consolidate data using tools like Excel or Tableau.
I use a consistent format for all reports to ensure clarity and ease of understanding.
I gather data from various sources and use tools like Excel or Tableau to consolidate it.
I ensure that all data is accurate and up-to-date before consolidating it.
I create visualizations to help convey the data in a clear and concise manner.
I collaborate with team members to ensure that all necessa...read more
Q108. Estimate the number of Denims sold in a year in India.
Estimating the number of Denims sold in a year in India.
Research the population of India and estimate the percentage of people who wear denims.
Consider factors like age group, income levels, and fashion trends.
Analyze the market share of denim brands and their sales data.
Study the growth rate of the fashion industry in India.
Take into account the demand for denims in different regions of India.
Consider the impact of online shopping and e-commerce platforms on denim sales.
Cons...read more
Q109. Our client is an established pharma company and wants to see if entering the sanitizer market is commercially viable for them. Help us.
Entering the sanitizer market can be commercially viable for the established pharma company.
An established pharma company already has the necessary infrastructure and expertise to produce sanitizers.
The demand for sanitizers has significantly increased due to the COVID-19 pandemic.
The company can leverage its existing distribution channels and customer base to promote and sell sanitizers.
Sanitizers can be a complementary product to the company's existing pharmaceutical offeri...read more
Q110. You know Normalizastion? Tell me what is 3rd normal form
3rd normal form is a database normalization technique where every non-key attribute is dependent on the primary key.
In 3NF, there should be no transitive dependencies between non-key attributes.
It reduces data redundancy and improves data integrity.
Example: A table with columns for customer ID, order ID, and product ID. The product name should not be stored in this table as it is dependent on the product ID, not the customer or order ID.
Another example: A table with columns f...read more
Q111. What is Encapsulation and Polymorphism in OO ABAP?
Encapsulation is the concept of hiding implementation details and exposing only necessary information. Polymorphism is the ability of objects to take on multiple forms.
Encapsulation helps in achieving data security and prevents unauthorized access to data.
Polymorphism allows objects to be treated as instances of their own class or as instances of their parent class.
Encapsulation and Polymorphism are key concepts in Object-Oriented Programming.
Example of Encapsulation: Private...read more
Q112. Difference between solution with requirement gathering and solution based on SAP best practices.
Solution with requirement gathering involves customizing the solution to meet specific needs, while solution based on SAP best practices follows pre-defined industry standards.
Solution with requirement gathering involves understanding the specific needs and goals of the client.
It requires gathering detailed requirements through interviews, workshops, and documentation.
The solution is then customized and tailored to meet those specific requirements.
This approach allows for fle...read more
Q113. Guesstimate: Our client owns a mine of Limestone at Meghalaya (90 sq. Km).Guesstimate no. of years' limestone can be extracted from the mine. (35 minutes)
Guesstimate the number of years limestone can be extracted from a 90 sq. km mine in Meghalaya.
Determine the total amount of limestone in the mine
Estimate the annual extraction rate based on current technology and demand
Consider any potential changes in technology or demand in the future
Factor in any environmental or regulatory constraints
Assuming a constant extraction rate, calculate the number of years until depletion
Q114. If a task approaches a deadline and scrum team tells you that we cannot deliver a particular part of the sprint backlog. As business analyst how will you plan and take care of this situation
As a business analyst, I will prioritize the remaining tasks and work with the scrum team to find a solution.
Assess the impact of the missed task on the overall sprint goal
Prioritize the remaining tasks based on their importance to the sprint goal
Collaborate with the scrum team to find a solution, such as extending the sprint or removing less critical tasks
Communicate the impact of the missed task to stakeholders and adjust expectations accordingly
Q115. Tell me end to end process of project management module in oracle
The end to end process of project management module in Oracle involves planning, executing, monitoring, and closing projects.
1. Planning phase involves defining project scope, objectives, and deliverables.
2. Execution phase includes assigning tasks, managing resources, and tracking progress.
3. Monitoring phase involves analyzing project performance, identifying risks, and making adjustments.
4. Closing phase includes finalizing project deliverables, obtaining client approval, ...read more
Q116. How will you Interpret VIF in linear regression?
VIF (Variance Inflation Factor) measures multicollinearity in linear regression by quantifying how much the variance of the estimated regression coefficients is inflated due to collinearity.
VIF values greater than 10 indicate high multicollinearity, suggesting that the independent variables are highly correlated.
VIF values close to 1 indicate low multicollinearity, meaning the independent variables are not highly correlated.
To calculate VIF, each independent variable is regre...read more
Q117. - If you had to choose between two processes which give the same outcome, but one of them is longer but more accurate and the other is short but less accurate, which one would you choose?
I would choose the longer but more accurate process.
Accuracy is crucial in decision-making and can have long-term consequences.
Investing more time in a process can lead to better outcomes and prevent costly mistakes.
Examples: Medical diagnosis, financial analysis, scientific research.
Q118. 15) What are the things need to post a value in server?
To post a value in a server, you need to consider the endpoint, request method, headers, body, and authentication.
Identify the endpoint where the value needs to be posted
Choose the appropriate request method (e.g., POST)
Set the necessary headers (e.g., Content-Type)
Construct the body payload with the value to be posted
Handle authentication if required (e.g., API key, token)
Q119. 16) What are the exception you are facing in selenium automation?
Common exceptions in Selenium automation include NoSuchElementException, TimeoutException, and StaleElementReferenceException.
NoSuchElementException occurs when an element cannot be found in the DOM.
TimeoutException occurs when a command takes longer than the timeout value to complete.
StaleElementReferenceException occurs when an element is no longer attached to the DOM.
Other exceptions include ElementNotVisibleException, ElementNotSelectableException, and WebDriverException.
Q120. What are features of EPIC ?What is Persona in Analysis?
EPIC is an electronic health record system. Persona is a fictional character representing a user group in analysis.
EPIC features include patient records, clinical decision support, and billing.
Persona is used in user-centered design to represent the needs and behaviors of a user group.
Persona helps in creating user stories and designing user interfaces.
Example: A persona for a hospital nurse may include information about their job responsibilities, technology proficiency, and...read more
Q121. Can we achieve multiple inheritance in ABAP?
No, ABAP does not support multiple inheritance.
ABAP only supports single inheritance through the use of interfaces and abstract classes.
Multiple inheritance can lead to ambiguity and complexity in the code.
However, ABAP does allow for the implementation of multiple interfaces.
Example: a class can implement both IF_A and IF_B interfaces.
Q122. Can we have multiple constructors for a class?
Yes, a class can have multiple constructors with different parameters.
Constructors are used to initialize objects of a class.
Multiple constructors can be defined with different parameters.
The constructor with the matching parameters is called when an object is created.
Constructors can also call other constructors using 'this' keyword.
Example: public class MyClass { public MyClass() {} public MyClass(int x) {} }
Q123. how to create dynamic tgt files dept wise
Dynamic tgt files can be created dept wise using scripting languages and database queries.
Identify the data fields required for the tgt files
Create a database query to extract the required data for each department
Use a scripting language like Python or Perl to automate the process of creating the tgt files
Ensure that the script is dynamic and can handle changes in the data or department structure
Test the script thoroughly before implementing it in a production environment
Q124. Documents used to procure using Central purchase Organisation?
Purchase requisition and purchase order are the documents used to procure using Central purchase Organisation.
Purchase requisition is used to request materials or services from a vendor
Purchase order is a legal document that authorizes the purchase transaction
Central purchase organization is responsible for procurement for multiple plants or company codes
Purchase requisition and purchase order are created in SAP MM module
Q125. Later we discussed two guesstimates, both on interests. Count the number of potholes on the roads of your hometown
I estimate there are around 10,000 potholes in my hometown.
I would estimate the total number of roads in my hometown and then divide by the average length of a road segment to get an estimate of the total number of segments.
Then, I would estimate the average number of potholes per segment based on my personal experience and observations.
Finally, I would multiply the total number of segments by the average number of potholes per segment to get my estimate.
For example, if there...read more
Q126. What methods do you use to analyze data in EPBCS aside from using forms?
Methods for analyzing data in EPBCS aside from using forms
Using Smart View for ad-hoc analysis and reporting
Leveraging Data Management for data integration and automation
Utilizing Financial Reporting Studio for creating custom reports
Q127. How do components interact with each other in Angular?
Components interact with each other through inputs, outputs, and services.
Components can pass data to child components through inputs.
Components can emit events to parent components through outputs.
Components can share data and functionality through services.
Components can also communicate through the @ViewChild and @ContentChild decorators.
Example: A parent component passes data to a child component through an input property.
Example: A child component emits an event to a par...read more
Q128. Write code which will return Non duplicate values from array.
Code to return non-duplicate values from an array.
Create an empty array to store non-duplicate values.
Loop through the original array and check if the value already exists in the new array.
If it doesn't exist, add it to the new array.
Return the new array with non-duplicate values.
Q129. What are criteria's of a workflow rule? What are process builders? What do you mean by sales process?
Criteria for workflow rules, process builders, and sales process
Workflow rule criteria include record type, evaluation criteria, and rule criteria
Process builders automate complex business processes
Sales process is a series of steps taken to convert a lead into a customer
Sales process can include lead generation, qualification, presentation, and closing
Sales process can be customized to fit the needs of a specific business
Q130. How do you setup and manager role-based permissions?
Setting up role-based permissions involves defining roles, assigning permissions to roles, and managing user access based on roles.
Define different roles based on job functions or responsibilities
Assign specific permissions to each role, determining what actions users in that role can perform
Grant or revoke access to resources based on roles
Regularly review and update roles and permissions to ensure security and compliance
Use role-based access control (RBAC) to streamline per...read more
Q131. Knowledge Management is a growing field. You are a smaller company going up against a more established one. What would you do?
Establish a niche and focus on personalized service to differentiate from the larger company.
Identify a specific area of knowledge management where the larger company may not be as strong
Offer personalized service and tailored solutions to clients
Leverage technology to streamline processes and improve efficiency
Build a strong online presence through social media and content marketing
Partner with other smaller companies to offer a wider range of services
Q132. Which design patterns are you familiar with?
I am familiar with design patterns such as Singleton, Factory, Observer, and Strategy.
Singleton
Factory
Observer
Strategy
Q133. What are threads in the context of programming?
Threads in programming are lightweight processes that can run concurrently within a program.
Threads allow for parallel execution of tasks within a program
Threads share the same memory space, allowing for efficient communication and data sharing
Examples of using threads include multi-threaded web servers and parallel processing in data analysis
Q134. 2) what is SDLC (Software Development Life Cycle) how it helps?
SDLC is a process followed by software development teams to design, develop and test high-quality software.
SDLC is a structured approach to software development.
It involves several phases such as planning, analysis, design, implementation, testing, and maintenance.
It helps in delivering high-quality software that meets customer requirements.
It ensures that the software is developed within budget and on time.
It helps in identifying and resolving issues early in the development...read more
Q135. What are joins and name one case where you applied it?
Joins are used to combine data from two or more tables based on a related column.
Joins are used in SQL to retrieve data from multiple tables.
Common types of joins include inner join, left join, right join, and full outer join.
One case where I applied joins was when I needed to retrieve customer information and their corresponding orders from two separate tables.
Another example is when I needed to combine data from a table of employees and a table of departments to determine w...read more
Q136. What is Close-Ended Mutual Fund?
A mutual fund with a fixed number of shares, traded on an exchange like a stock.
Investors buy and sell shares of the fund on the exchange
The price of the shares is determined by supply and demand
The fund is managed by a professional portfolio manager
Examples include index funds and ETFs
Q137. How to write file name into a flat file?
To write file name into a flat file, use file handling functions in programming languages.
Open the flat file in write mode
Use file handling functions to write the file name into the flat file
Close the flat file
Q138. How can you troubleshoot Disk corrupt issue.
To troubleshoot disk corrupt issue, check disk errors, run chkdsk, repair disk, and recover data.
Check for disk errors using Event Viewer or Disk Utility
Run chkdsk command to scan and fix disk errors
Repair disk using disk repair tool or reinstalling OS
Recover data using data recovery software or professional services
Q139. how to generate sequence from wf to mapping
To generate sequence from wf to mapping, use a mapping transformation in the integration tool.
Create a mapping transformation in the integration tool
Add the workflow as a source in the mapping
Add the target mapping as the target in the mapping
Map the fields from the workflow to the target mapping
Execute the mapping to generate the sequence in the target mapping
Q140. How is the role of a Product Owner different from a Scrum Master?
Product Owner defines what to build, Scrum Master ensures the team builds it effectively.
Product Owner is responsible for defining and prioritizing the product backlog
Scrum Master is responsible for facilitating the Scrum process and removing impediments
Product Owner represents the stakeholders and communicates their needs to the team
Scrum Master coaches the team on Agile principles and helps them self-organize
Product Owner focuses on the 'what' and 'why' of the product
Scrum ...read more
Q141. 1) how to do version comparison in Smartforms.
Version comparison in Smartforms
Use the 'Version Management' option in Smartforms
Select the form and click on 'Versions' button
Compare the versions and select the desired one
Preview and save the form with the selected version
Q142. So, why did you focus on developing ppt more Visually.
Visual aids enhance audience engagement and comprehension.
Visuals help break up text-heavy slides
Images and graphics can convey complex information quickly
Animations and transitions add interest and keep audience focused
Visuals can help reinforce key points and improve retention
Effective use of color and design can enhance overall presentation
Visuals can help accommodate different learning styles
Visuals can make a presentation more memorable and impactful
Q143. What’s the relation between pointers and Security?
Pointers are used in programming to manage memory and can be a potential security vulnerability if not handled properly.
Pointers allow direct access to memory locations, making it possible to manipulate data or execute arbitrary code.
Improper use of pointers can lead to buffer overflows, memory leaks, and other security vulnerabilities.
Pointers can be exploited by attackers to gain unauthorized access, execute malicious code, or crash a system.
Examples of pointer-related secu...read more
Q144. How to provide security to apis without using spring security
Implement API security using token-based authentication and authorization
Use token-based authentication like JWT (JSON Web Tokens)
Implement custom authentication and authorization logic in the API endpoints
Utilize API keys for access control and rate limiting
Implement OAuth for secure authorization and delegation of access
Q145. You have a background with Oracle, so is there a s preference of working on oracle over SAP?
There is no preference of working on Oracle over SAP based on my background.
Both Oracle and SAP have their own strengths and weaknesses.
The choice between Oracle and SAP depends on the specific requirements of the project or organization.
Oracle is known for its robust database management system and comprehensive suite of business applications.
SAP, on the other hand, is renowned for its integrated enterprise resource planning (ERP) solutions.
It is important to evaluate factors...read more
Q146. What is different ways of identification in tosca? What os exploratory testing? What is module based testing? What are standard modules available in tosca? Syntax for date time format?
Tosca offers multiple ways of identification including visual recognition, object recognition, and text recognition.
Visual recognition identifies objects based on their appearance
Object recognition identifies objects based on their properties and attributes
Text recognition identifies objects based on their text content
Module based testing involves testing individual modules of an application separately
Standard modules in Tosca include Test Case Design, Test Data Management, a...read more
Q147. What are the 7 layers in OSI model of Networking?
The OSI model has 7 layers that define how data is transmitted over a network.
The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and communicates with the layers above and below it.
For example, the Physical layer deals with the physical transmission of data, while the Application layer deals with user interfaces and applications.
The OSI model is a conceptual model and is not always followed exactl...read more
Q148. What is call by value and call by reference?
Call by value and call by reference are two ways of passing arguments to a function.
Call by value passes a copy of the argument's value to the function.
Call by reference passes a reference to the argument's memory location to the function.
Call by value is used for simple data types like int, float, etc.
Call by reference is used for complex data types like arrays, structures, etc.
Q149. What are the three key artefacts of scrum
The three key artefacts of Scrum are Product Backlog, Sprint Backlog, and Increment.
Product Backlog: prioritized list of features or requirements
Sprint Backlog: list of tasks to be completed during a sprint
Increment: the sum of all completed product backlog items at the end of a sprint
All three artefacts are essential for successful implementation of Scrum
Q150. Architecture and functionalities of BeyondTrust PowerBroker
BeyondTrust PowerBroker is a privileged access management solution that provides control over user access to critical systems and data.
PowerBroker allows organizations to manage and control privileged access across multiple platforms, including Windows, Unix, Linux, and Mac OS.
It provides granular access control, allowing administrators to define policies based on user roles and responsibilities.
PowerBroker also includes auditing and reporting capabilities, enabling organizat...read more
Q151. What is transfer pricing and its different methods?
Transfer pricing is the practice of determining the value of goods or services exchanged between related entities in different tax jurisdictions.
Transfer pricing is used to determine the price of goods or services transferred between related entities in different countries.
It is important for companies to ensure that transfer pricing is done at arm's length, meaning the price is similar to what would be charged between unrelated parties.
There are several methods of transfer p...read more
Q152. Why would a company choose Agile methodology over waterfall methodology ?
Agile methodology allows for flexibility, faster delivery, and continuous improvement compared to the rigid and sequential approach of waterfall methodology.
Agile allows for continuous feedback and adaptation, while waterfall is a linear process
Agile promotes collaboration and communication between team members and stakeholders
Agile enables faster delivery of working software in smaller increments
Agile allows for changes to be made throughout the development process, while wa...read more
Q153. Explain how you test a change management control when the application doesn't store the updates log.
Testing change management control without update log
Create a test environment to simulate the change
Document the change and expected outcome
Perform the change and observe the system behavior
Compare the system behavior with the expected outcome
Repeat the process with different scenarios
Use version control to track changes
Q154. 12) What is rest-assured? How to handle the certificate issues in rest-assured?
Rest-assured is a Java-based library used for testing RESTful APIs.
Rest-assured simplifies the testing of RESTful APIs by providing a domain-specific language (DSL) for writing tests.
To handle certificate issues in rest-assured, we can use the relaxedHTTPSValidation() method to bypass SSL certificate validation.
We can also import the certificate into the truststore and use it for SSL validation.
Q155. How Test cases are reported to stakeholders ?
Test cases are reported to stakeholders through detailed reports and presentations.
Test cases are documented and organized in a clear and concise manner.
Reports are created to summarize the test results and highlight any issues or concerns.
Presentations are given to stakeholders to provide an overview of the testing process and results.
Communication with stakeholders is ongoing throughout the testing process to ensure transparency and collaboration.
Examples of test case repor...read more
Q156. How would you select samples from 300 ledger accounts? If an account had 1000 entries worth one million dollars, how would you obtain reasonable assurance that they are correct?
To select samples from 300 ledger accounts, I would use statistical sampling techniques and stratification.
I would stratify the accounts based on their size, activity, and risk level.
I would then use statistical sampling techniques such as random sampling or systematic sampling to select a representative sample from each stratum.
For the account with 1000 entries worth one million dollars, I would use monetary unit sampling to select a sample of entries based on their dollar v...read more
Q157. How would arrive at a conclusion to a complex question?
I would gather relevant information, analyze data, consult with experts, consider different perspectives, and use critical thinking to arrive at a conclusion.
Gather all relevant information related to the complex question
Analyze data and statistics to identify patterns and trends
Consult with subject matter experts to gain insights and perspectives
Consider different viewpoints and arguments before forming a conclusion
Utilize critical thinking skills to evaluate the information...read more
Q158. How would you integrate Primavera with SAP?
Integrating Primavera with SAP involves establishing a data exchange between the two systems to ensure seamless project management and financial integration.
Identify the data to be exchanged between Primavera and SAP
Map the data fields and establish a data mapping strategy
Implement an integration solution using middleware or custom development
Test and validate the integration to ensure data accuracy and consistency
Establish a monitoring and maintenance plan for ongoing integr...read more
Q159. What is a stock and a bond?
A stock is a share of ownership in a company, while a bond is a debt security issued by a company or government.
Stocks represent ownership in a company and give shareholders voting rights and potential dividends.
Bonds represent a loan to a company or government and pay interest to the bondholder.
Stocks are generally considered riskier but offer higher potential returns, while bonds are considered safer but offer lower returns.
Investors often use a combination of stocks and bo...read more
Q160. what are access specifiers in c++
Access specifiers in C++ are keywords that determine the visibility and accessibility of class members.
There are three access specifiers in C++: public, private, and protected.
Public members are accessible from anywhere in the program.
Private members are only accessible within the class itself.
Protected members are accessible within the class and its derived classes.
Access specifiers are used to enforce encapsulation and control the access to class members.
Q161. Informatica lookup transformation, difference between static and dynamic lookup.
Static and dynamic lookup in Informatica
Static lookup caches the lookup table data at the beginning of the session while dynamic lookup caches data as required during the session
Static lookup is faster but consumes more memory while dynamic lookup is slower but consumes less memory
Static lookup is used when the lookup table is small and doesn't change frequently while dynamic lookup is used when the lookup table is large or changes frequently
Q162. How do you connect multi VPC without the use of a transit gateway?
Multi VPCs can be connected using VPC peering or VPN connections.
VPC peering allows direct communication between VPCs using private IP addresses.
VPN connections can be established between VPCs using virtual private gateways.
Routing tables need to be updated to allow traffic flow between VPCs.
Security groups and network ACLs need to be configured to allow traffic between VPCs.
AWS Transit Gateway can also be used to connect multiple VPCs.
VPC peering and VPN connections have lim...read more
Q163. 9) When an Asset increases it must be debited or credited?
When an asset increases, it must be debited.
Debit increases assets and credit decreases assets.
Assets include cash, accounts receivable, inventory, property, and equipment.
For example, if a company purchases a new machine, the asset account for machinery will be debited to increase it.
This is based on the accounting equation: Assets = Liabilities + Equity.
Q164. How you load 1 million record without any external tool
Use batch processing and optimized SQL queries to load 1 million records without external tools.
Utilize batch processing to insert records in chunks rather than individually
Optimize SQL queries for efficient data loading
Consider using stored procedures for faster data insertion
Q165. What is DLP? Explain its working.
DLP stands for Data Loss Prevention. It is a security solution that helps prevent sensitive data from being leaked or lost.
DLP works by identifying and classifying sensitive data, such as credit card numbers or social security numbers.
It then monitors the flow of this data, both within the organization and outside of it.
If it detects any unauthorized attempts to access or transmit this data, it can take action to prevent it.
Examples of DLP solutions include endpoint protectio...read more
Q166. Is Javascript a single/multi threaded language? If single threaded then how does backend calls work?
Javascript is a single-threaded language, but it can handle asynchronous operations through callbacks and promises.
Javascript is single-threaded, meaning it can only execute one task at a time.
However, it can handle asynchronous operations by using callbacks, promises, and async/await.
Backend calls in Javascript are typically made using asynchronous functions, allowing the program to continue executing other tasks while waiting for the response.
For example, when making an HTT...read more
Q167. What is raml? difference between fragments and traits
RAML is a RESTful API Modeling Language used to describe APIs. Fragments are reusable parts of RAML files, while traits are reusable sets of properties and methods.
RAML is a language for describing APIs in a structured way
Fragments in RAML are reusable parts of RAML files that can be included in multiple API definitions
Traits in RAML are reusable sets of properties and methods that can be applied to multiple resources or methods
Fragments and traits help in reducing duplicatio...read more
Q168. Guesstimate the market size of my client based on the information I knew.
Market size guesstimate for client
Need more information on client's industry and target market
Assuming client operates in the US, estimate total addressable market (TAM) for their product/service
Calculate client's market share based on revenue or customer base
Consider potential growth opportunities and market trends
Final estimate should be based on a range of scenarios
Q169. What are 5 heads of income? What is depreciation and types? What is accrued interest?
The 5 heads of income are salary, house property, business/profession, capital gains, and other sources.
Salary income includes income from employment
House property income includes rental income
Business/profession income includes income from self-employment
Capital gains income includes profits from sale of assets
Other sources income includes income from sources not covered under the other heads
Depreciation is the decrease in value of an asset over time
Types of depreciation inc...read more
Q170. Movement types and transaction event keys in Subcontracting process?
In subcontracting process, movement types and transaction event keys are used to track the movement of materials between the subcontractor and the company.
Movement type 541 is used to transfer raw materials to the subcontractor
Movement type 542 is used to receive the finished goods from the subcontractor
Transaction event key WE is used for goods issue to the subcontractor
Transaction event key WA is used for goods receipt from the subcontractor
Q171. Tell me the five criterias to recognise revenue as per Ind As 115
The five criteria to recognize revenue as per Ind AS 115 are identification of contract, identification of performance obligations, determination of transaction price, allocation of transaction price, and recognition of revenue when performance obligations are satisfied.
Identification of contract
Identification of performance obligations
Determination of transaction price
Allocation of transaction price
Recognition of revenue when performance obligations are satisfied
Q172. what is the difference between designing a website and a mobile application?
Designing a website and a mobile application differ in terms of screen size, user behavior, and functionality.
Screen size: Mobile screens are smaller, so the design should be optimized for smaller screens.
User behavior: Mobile users tend to interact differently than website users, so the design should be tailored to their behavior.
Functionality: Mobile apps can take advantage of device features like GPS and camera, while websites cannot.
Examples: A website may have a navigati...read more
Q173. How to install SCCM Client if the machine is not in VPN and Organization network?
SCCM client can be installed using internet-based client management or cloud management gateway.
Use internet-based client management to install SCCM client over the internet.
Configure cloud management gateway to install SCCM client from the cloud.
Ensure that the client has internet connectivity and proper authentication credentials.
Use client push installation method or manual installation method.
In manual installation method, download the client installation package and run ...read more
Q174. What are business rules constructed using?
Business rules are constructed using logic and conditions.
Logic
Conditions
Constraints
Decision tables
Rule engines
Q175. Which all technology you have came across?
I have experience with a wide range of technologies including Java, Python, SQL, AWS, Docker, and Kubernetes.
Java
Python
SQL
AWS
Docker
Kubernetes
Q176. How would you use Data Analytics to device a solution so that school kids reach to school and back home safely and on time without the parents being worried
Utilize data analytics to ensure safe and timely transportation for school kids without parents' worry
Collect data on traffic patterns and congestion to optimize bus routes
Implement GPS tracking on buses to monitor their location in real-time
Utilize predictive analytics to anticipate potential delays and adjust schedules accordingly
Create a communication platform for parents to receive updates on their child's transportation status
Analyze historical data to identify common is...read more
Q177. What are mutable and immutable data types?
Mutable data types can be changed after creation, while immutable data types cannot be changed.
Mutable data types include lists, dictionaries, and sets.
Immutable data types include strings, tuples, and frozensets.
Changing a mutable data type will modify the original object, while changing an immutable data type will create a new object.
Example: changing a list by appending an element will modify the original list, while concatenating two strings will create a new string.
Q178. What are the features of Java 8?
Java 8 introduced several new features including lambda expressions, functional interfaces, streams, and default methods.
Lambda expressions allow you to write code in a more concise and readable way. For example, (a, b) -> a + b.
Functional interfaces are interfaces with a single abstract method, such as java.util.function.Function.
Streams provide a way to work with collections of objects in a functional style. For example, stream.filter(x -> x > 5).forEach(System.out::println...read more
Q179. Explain Compile time and Run time polymorphism with Example
Compile time polymorphism is achieved through function overloading and operator overloading, while run time polymorphism is achieved through virtual functions and inheritance.
Compile time polymorphism is resolved during compile time based on the number and types of arguments passed to a function. Example: function overloading.
Run time polymorphism is resolved during runtime based on the actual object type. Example: virtual functions in inheritance.
Compile time polymorphism is...read more
Q180. What are the roles associated with Scrum ?
Scrum roles include Product Owner, Scrum Master, and Development Team.
Product Owner is responsible for defining and prioritizing the product backlog.
Scrum Master facilitates the Scrum process and ensures adherence to Scrum principles.
Development Team is responsible for delivering a potentially releasable product increment at the end of each sprint.
Q181. Guestimate: Estimate the number of MRI scanners in India.
Estimating the number of MRI scanners in India.
Research the population of India and the number of MRI scanners per capita in other countries.
Consider the number of hospitals and medical facilities in India.
Take into account the healthcare infrastructure and accessibility in different regions of India.
Consult industry reports and statistics on the healthcare sector in India.
Consider the growth rate of MRI scanner installations in recent years.
Q182. Describe your journey from Data Science to Consulting.
Transitioned from Data Science to Consulting by leveraging analytical skills and business acumen.
Developed expertise in data analysis and modeling through academic and professional experience.
Recognized the importance of understanding business objectives and translating data insights into actionable recommendations.
Built strong communication and presentation skills to effectively convey complex information to clients.
Collaborated with cross-functional teams to deliver solutio...read more
Q183. CASE STUDIE:- CALCULATE REVENUE OF ICE CREAM PARLOUR
To calculate revenue of an ice cream parlor, we need to consider factors like sales volume, pricing strategy, and operational costs.
Determine the average number of customers per day and the average amount spent per customer
Consider the cost of ingredients, labor, rent, and utilities
Analyze the competition and adjust pricing strategy accordingly
Explore opportunities for upselling and cross-selling
Track sales and expenses regularly to identify trends and make informed decisions
Q184. Design a ticket booking system on the lines of book my show.
A ticket booking system similar to BookMyShow
User registration and login
Event listing and selection
Seat selection and payment
Confirmation and ticket generation
Integration with payment gateways
Admin panel for event and user management
Q185. What is the use of JVM in Java?
JVM is the virtual machine that executes Java bytecode. It provides platform independence and memory management.
JVM stands for Java Virtual Machine
It interprets compiled Java code into machine language
JVM provides platform independence by executing bytecode on any platform
It manages memory allocation and garbage collection
Examples of JVM-based languages include Kotlin and Scala
Q186. Write a function to normalise a decimal number without using math functions.
Function to normalise a decimal number without using math functions.
Extract the integer and decimal parts of the number
Count the number of digits in the decimal part
Multiply the decimal part by 10^number of decimal digits to convert it to an integer
Add the integer and converted decimal parts and return the result
Q187. Can we create composite unique keys on multiple columns in a single table
Yes, composite unique keys can be created on multiple columns in a single table.
Composite unique keys are useful for ensuring data integrity and preventing duplicates.
Syntax: CREATE TABLE table_name (column1 datatype, column2 datatype, ..., CONSTRAINT constraint_name UNIQUE (column1, column2, ...));
Example: CREATE TABLE employees (id INT, name VARCHAR(50), email VARCHAR(50), CONSTRAINT emp_unique UNIQUE (id, email));
Q188. How do you do ageing analysis/how do you prepare bills payables
Ageing analysis is done by categorizing bills payables by their due dates and calculating the number of days past due.
Sort bills payables by due date
Categorize bills payables by age (e.g. 0-30 days past due, 31-60 days past due, etc.)
Calculate the total amount of bills payables in each age category
Analyze the trend of bills payables aging over time
Prepare a report to show the ageing analysis results
Q189. What are webhooks in shopify?
Webhooks in Shopify are notifications sent to a URL when certain events occur in a store.
Webhooks allow apps to receive real-time data about events in a Shopify store
Developers can use webhooks to automate tasks or trigger actions based on specific events
Examples of events that can trigger webhooks include order creation, product updates, and customer registration
Q190. Write some LINQ statements which are used for String and DataTable manipulations
LINQ statements for String and DataTable manipulations
For String manipulations, use methods like Where, Select, OrderBy, GroupBy, etc.
For DataTable manipulations, use methods like Where, Select, OrderBy, GroupBy, Join, etc.
Use lambda expressions to specify the conditions for filtering, sorting, grouping, etc.
Example: var result = myStringArray.Where(s => s.Length > 5).OrderBy(s => s);
Example: var result = myDataTable.Where(row => row.Field
("Age") > 18).Select(row => row.Field...read more
Q191. What is acceptance testing and who do beta testing ?
Acceptance testing is a type of testing to ensure that the software meets the customer's requirements. Beta testing is done by end-users.
Acceptance testing is done to ensure that the software meets the customer's requirements
It is usually done by the customer or a representative of the customer
Beta testing is done by end-users to identify any issues before the software is released to the public
Beta testing is usually done in a real-world environment
Both acceptance testing and...read more
Q192. 10) When equity decreases it must be debited or credited?
Equity decreases must be debited.
Equity is a credit balance account, so when it decreases, it must be debited to reduce the credit balance.
Debiting equity reduces the owner's or shareholder's equity in the business.
Examples of equity decreasing transactions include paying dividends, recording losses, or issuing treasury stock.
Q193. An auto after sales company is not doing well. It has been found that their supply chain solution might not be very effective. They are considering 2 more options in redesigning their supply chain. Should they...
read moreYes, they should change their supply chain solution.
The current supply chain solution is not effective, which is impacting the company's performance.
Changing the supply chain can lead to improved efficiency, cost reduction, and customer satisfaction.
Consider the potential benefits and drawbacks of each option before making a decision.
Examples of options could include implementing a new inventory management system or outsourcing logistics operations.
Q194. What is the ticketing tool used in your project
The ticketing tool used in our project is JIRA.
JIRA is a popular project management tool used for issue tracking and agile project management.
It allows for creating, tracking, and managing tasks and issues throughout the project lifecycle.
Users can prioritize, assign, and track progress of tasks using JIRA.
JIRA also offers customizable workflows and reporting features for better project management.
Example: We use JIRA to create and track user stories, bugs, and tasks in our s...read more
Q195. What are the basic differences between the different types of SQL joins?
SQL joins are used to combine rows from two or more tables based on a related column between them.
INNER JOIN: Returns records that have matching values in both tables.
LEFT JOIN: Returns all records from the left table and the matched records from the right table.
RIGHT JOIN: Returns all records from the right table and the matched records from the left table.
FULL JOIN: Returns all records when there is a match in either left or right table.
CROSS JOIN: Returns the Cartesian pro...read more
Q196. New technology in the field of semiconductor industry?
The semiconductor industry is constantly evolving with new technologies such as AI, IoT, and 5G driving innovation.
AI is being used to improve chip design and manufacturing processes
IoT is driving demand for low-power and high-performance chips
5G is increasing demand for high-speed and low-latency chips
Emerging technologies such as quantum computing and neuromorphic computing are being explored for future applications
Q197. What is EDR? Explain its working.
EDR stands for Endpoint Detection and Response. It is a cybersecurity technology that detects and responds to threats on endpoints.
EDR monitors endpoint activity for suspicious behavior
It uses machine learning and behavioral analysis to identify threats
EDR can isolate infected endpoints and contain the threat
Examples of EDR solutions include CrowdStrike, Carbon Black, and SentinelOne
Q198. Explain Inheritance and how you have implemented inheritance in your work?
Inheritance is a concept in object-oriented programming where a class inherits properties and behaviors from another class.
Inheritance allows for code reuse and promotes modularity.
The class that is being inherited from is called the superclass or base class.
The class that inherits from the superclass is called the subclass or derived class.
The subclass inherits all the public and protected members of the superclass.
Inheritance is implemented using the 'extends' keyword in la...read more
Q199. Write a program to sort an array, half in ascending and half in descending
Program to sort an array, half ascending and half descending
Split the array into two halves
Sort the first half in ascending order and the second half in descending order
Merge the two sorted halves back together
Q200. Example, when your are script writer. How do you establish connection to DB?
Establishing connection to a DB as a script writer.
Choose a suitable programming language for the task
Install the necessary database driver
Provide the correct credentials for the database
Test the connection before proceeding with the script
More about working at Deloitte




Top HR Questions asked in Deloitte
Interview Process at Deloitte

Top Interview Questions from Similar Companies






Reviews
Interviews
Salaries
Users/Month