Add office photos
Premium Employer

Deloitte

3.8
based on 16.7k Reviews
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

1500+ Invictus Digisoft Interview Questions and Answers

Updated 17 Dec 2024
Popular Designations

Q101. 2) what is SDLC (Software Development Life Cycle) how it helps?

Ans.

SDLC is a process followed by software development teams to design, develop and test high-quality software.

  • SDLC is a structured approach to software development.

  • It involves several phases such as planning, analysis, design, implementation, testing, and maintenance.

  • It helps in delivering high-quality software that meets customer requirements.

  • It ensures that the software is developed within budget and on time.

  • It helps in identifying and resolving issues early in the development...read more

Add your answer

Q102. What is Close-Ended Mutual Fund?

Ans.

A mutual fund with a fixed number of shares, traded on an exchange like a stock.

  • Investors buy and sell shares of the fund on the exchange

  • The price of the shares is determined by supply and demand

  • The fund is managed by a professional portfolio manager

  • Examples include index funds and ETFs

Add your answer

Q103. What is functional testing and its types ?

Ans.

Functional testing is a type of testing that verifies if the software meets the specified requirements.

  • It focuses on the functionality of the software

  • It is performed to ensure that the software meets the business requirements

  • Types of functional testing include unit testing, integration testing, system testing, and acceptance testing

  • Examples of functional testing tools include Selenium, HP QuickTest Professional, and IBM Rational Functional Tester

View 2 more answers

Q104. How can you troubleshoot Disk corrupt issue.

Ans.

To troubleshoot disk corrupt issue, check disk errors, run chkdsk, repair disk, and recover data.

  • Check for disk errors using Event Viewer or Disk Utility

  • Run chkdsk command to scan and fix disk errors

  • Repair disk using disk repair tool or reinstalling OS

  • Recover data using data recovery software or professional services

View 1 answer
Discover Invictus Digisoft interview dos and don'ts from real experiences

Q105. Estimate the number of Denims sold in a year in India.

Ans.

Estimating the number of Denims sold in a year in India.

  • Research the population of India and estimate the percentage of people who wear denims.

  • Consider factors like age group, income levels, and fashion trends.

  • Analyze the market share of denim brands and their sales data.

  • Study the growth rate of the fashion industry in India.

  • Take into account the demand for denims in different regions of India.

  • Consider the impact of online shopping and e-commerce platforms on denim sales.

  • Cons...read more

View 1 answer

Q106. Our client is an established pharma company and wants to see if entering the sanitizer market is commercially viable for them. Help us.

Ans.

Entering the sanitizer market can be commercially viable for the established pharma company.

  • An established pharma company already has the necessary infrastructure and expertise to produce sanitizers.

  • The demand for sanitizers has significantly increased due to the COVID-19 pandemic.

  • The company can leverage its existing distribution channels and customer base to promote and sell sanitizers.

  • Sanitizers can be a complementary product to the company's existing pharmaceutical offeri...read more

Add your answer
Are these interview questions helpful?

Q107. Difference between solution with requirement gathering and solution based on SAP best practices.

Ans.

Solution with requirement gathering involves customizing the solution to meet specific needs, while solution based on SAP best practices follows pre-defined industry standards.

  • Solution with requirement gathering involves understanding the specific needs and goals of the client.

  • It requires gathering detailed requirements through interviews, workshops, and documentation.

  • The solution is then customized and tailored to meet those specific requirements.

  • This approach allows for fle...read more

View 1 answer

Q108. What is Encapsulation and Polymorphism in OO ABAP?

Ans.

Encapsulation is the concept of hiding implementation details and exposing only necessary information. Polymorphism is the ability of objects to take on multiple forms.

  • Encapsulation helps in achieving data security and prevents unauthorized access to data.

  • Polymorphism allows objects to be treated as instances of their own class or as instances of their parent class.

  • Encapsulation and Polymorphism are key concepts in Object-Oriented Programming.

  • Example of Encapsulation: Private...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q109. What’s the relation between pointers and Security?

Ans.

Pointers are used in programming to manage memory and can be a potential security vulnerability if not handled properly.

  • Pointers allow direct access to memory locations, making it possible to manipulate data or execute arbitrary code.

  • Improper use of pointers can lead to buffer overflows, memory leaks, and other security vulnerabilities.

  • Pointers can be exploited by attackers to gain unauthorized access, execute malicious code, or crash a system.

  • Examples of pointer-related secu...read more

Add your answer

Q110. Guesstimate: Our client owns a mine of Limestone at Meghalaya (90 sq. Km).Guesstimate no. of years' limestone can be extracted from the mine. (35 minutes)

Ans.

Guesstimate the number of years limestone can be extracted from a 90 sq. km mine in Meghalaya.

  • Determine the total amount of limestone in the mine

  • Estimate the annual extraction rate based on current technology and demand

  • Consider any potential changes in technology or demand in the future

  • Factor in any environmental or regulatory constraints

  • Assuming a constant extraction rate, calculate the number of years until depletion

Add your answer

Q111. If a task approaches a deadline and scrum team tells you that we cannot deliver a particular part of the sprint backlog. As business analyst how will you plan and take care of this situation

Ans.

As a business analyst, I will prioritize the remaining tasks and work with the scrum team to find a solution.

  • Assess the impact of the missed task on the overall sprint goal

  • Prioritize the remaining tasks based on their importance to the sprint goal

  • Collaborate with the scrum team to find a solution, such as extending the sprint or removing less critical tasks

  • Communicate the impact of the missed task to stakeholders and adjust expectations accordingly

Add your answer

Q112. What is different ways of identification in tosca? What os exploratory testing? What is module based testing? What are standard modules available in tosca? Syntax for date time format?

Ans.

Tosca offers multiple ways of identification including visual recognition, object recognition, and text recognition.

  • Visual recognition identifies objects based on their appearance

  • Object recognition identifies objects based on their properties and attributes

  • Text recognition identifies objects based on their text content

  • Module based testing involves testing individual modules of an application separately

  • Standard modules in Tosca include Test Case Design, Test Data Management, a...read more

Add your answer

Q113. What is call by value and call by reference?

Ans.

Call by value and call by reference are two ways of passing arguments to a function.

  • Call by value passes a copy of the argument's value to the function.

  • Call by reference passes a reference to the argument's memory location to the function.

  • Call by value is used for simple data types like int, float, etc.

  • Call by reference is used for complex data types like arrays, structures, etc.

Add your answer

Q114. What are the 7 layers in OSI model of Networking?

Ans.

The OSI model has 7 layers that define how data is transmitted over a network.

  • The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer has a specific function and communicates with the layers above and below it.

  • For example, the Physical layer deals with the physical transmission of data, while the Application layer deals with user interfaces and applications.

  • The OSI model is a conceptual model and is not always followed exactl...read more

Add your answer

Q115. How will you Interpret VIF in linear regression?

Ans.

VIF (Variance Inflation Factor) measures multicollinearity in linear regression by quantifying how much the variance of the estimated regression coefficients is inflated due to collinearity.

  • VIF values greater than 10 indicate high multicollinearity, suggesting that the independent variables are highly correlated.

  • VIF values close to 1 indicate low multicollinearity, meaning the independent variables are not highly correlated.

  • To calculate VIF, each independent variable is regre...read more

Add your answer

Q116. 15) What are the things need to post a value in server?

Ans.

To post a value in a server, you need to consider the endpoint, request method, headers, body, and authentication.

  • Identify the endpoint where the value needs to be posted

  • Choose the appropriate request method (e.g., POST)

  • Set the necessary headers (e.g., Content-Type)

  • Construct the body payload with the value to be posted

  • Handle authentication if required (e.g., API key, token)

View 1 answer

Q117. 16) What are the exception you are facing in selenium automation?

Ans.

Common exceptions in Selenium automation include NoSuchElementException, TimeoutException, and StaleElementReferenceException.

  • NoSuchElementException occurs when an element cannot be found in the DOM.

  • TimeoutException occurs when a command takes longer than the timeout value to complete.

  • StaleElementReferenceException occurs when an element is no longer attached to the DOM.

  • Other exceptions include ElementNotVisibleException, ElementNotSelectableException, and WebDriverException.

View 1 answer

Q118. What are features of EPIC ?What is Persona in Analysis?

Ans.

EPIC is an electronic health record system. Persona is a fictional character representing a user group in analysis.

  • EPIC features include patient records, clinical decision support, and billing.

  • Persona is used in user-centered design to represent the needs and behaviors of a user group.

  • Persona helps in creating user stories and designing user interfaces.

  • Example: A persona for a hospital nurse may include information about their job responsibilities, technology proficiency, and...read more

Add your answer

Q119. how to create dynamic tgt files dept wise

Ans.

Dynamic tgt files can be created dept wise using scripting languages and database queries.

  • Identify the data fields required for the tgt files

  • Create a database query to extract the required data for each department

  • Use a scripting language like Python or Perl to automate the process of creating the tgt files

  • Ensure that the script is dynamic and can handle changes in the data or department structure

  • Test the script thoroughly before implementing it in a production environment

Add your answer

Q120. Can we achieve multiple inheritance in ABAP?

Ans.

No, ABAP does not support multiple inheritance.

  • ABAP only supports single inheritance through the use of interfaces and abstract classes.

  • Multiple inheritance can lead to ambiguity and complexity in the code.

  • However, ABAP does allow for the implementation of multiple interfaces.

  • Example: a class can implement both IF_A and IF_B interfaces.

Add your answer

Q121. Can we have multiple constructors for a class?

Ans.

Yes, a class can have multiple constructors with different parameters.

  • Constructors are used to initialize objects of a class.

  • Multiple constructors can be defined with different parameters.

  • The constructor with the matching parameters is called when an object is created.

  • Constructors can also call other constructors using 'this' keyword.

  • Example: public class MyClass { public MyClass() {} public MyClass(int x) {} }

Add your answer

Q122. Documents used to procure using Central purchase Organisation?

Ans.

Purchase requisition and purchase order are the documents used to procure using Central purchase Organisation.

  • Purchase requisition is used to request materials or services from a vendor

  • Purchase order is a legal document that authorizes the purchase transaction

  • Central purchase organization is responsible for procurement for multiple plants or company codes

  • Purchase requisition and purchase order are created in SAP MM module

View 1 answer

Q123. Later we discussed two guesstimates, both on interests. Count the number of potholes on the roads of your hometown

Ans.

I estimate there are around 10,000 potholes in my hometown.

  • I would estimate the total number of roads in my hometown and then divide by the average length of a road segment to get an estimate of the total number of segments.

  • Then, I would estimate the average number of potholes per segment based on my personal experience and observations.

  • Finally, I would multiply the total number of segments by the average number of potholes per segment to get my estimate.

  • For example, if there...read more

Add your answer

Q124. Write code which will return Non duplicate values from array.

Ans.

Code to return non-duplicate values from an array.

  • Create an empty array to store non-duplicate values.

  • Loop through the original array and check if the value already exists in the new array.

  • If it doesn't exist, add it to the new array.

  • Return the new array with non-duplicate values.

View 2 more answers

Q125. What is a stock and a bond?

Ans.

A stock is a share of ownership in a company, while a bond is a debt security issued by a company or government.

  • Stocks represent ownership in a company and give shareholders voting rights and potential dividends.

  • Bonds represent a loan to a company or government and pay interest to the bondholder.

  • Stocks are generally considered riskier but offer higher potential returns, while bonds are considered safer but offer lower returns.

  • Investors often use a combination of stocks and bo...read more

Add your answer

Q126. What are criteria's of a workflow rule? What are process builders? What do you mean by sales process?

Ans.

Criteria for workflow rules, process builders, and sales process

  • Workflow rule criteria include record type, evaluation criteria, and rule criteria

  • Process builders automate complex business processes

  • Sales process is a series of steps taken to convert a lead into a customer

  • Sales process can include lead generation, qualification, presentation, and closing

  • Sales process can be customized to fit the needs of a specific business

Add your answer

Q127. How do you setup and manager role-based permissions?

Ans.

Setting up role-based permissions involves defining roles, assigning permissions to roles, and managing user access based on roles.

  • Define different roles based on job functions or responsibilities

  • Assign specific permissions to each role, determining what actions users in that role can perform

  • Grant or revoke access to resources based on roles

  • Regularly review and update roles and permissions to ensure security and compliance

  • Use role-based access control (RBAC) to streamline per...read more

Add your answer

Q128. What are joins and name one case where you applied it?

Ans.

Joins are used to combine data from two or more tables based on a related column.

  • Joins are used in SQL to retrieve data from multiple tables.

  • Common types of joins include inner join, left join, right join, and full outer join.

  • One case where I applied joins was when I needed to retrieve customer information and their corresponding orders from two separate tables.

  • Another example is when I needed to combine data from a table of employees and a table of departments to determine w...read more

Add your answer

Q129. How to write file name into a flat file?

Ans.

To write file name into a flat file, use file handling functions in programming languages.

  • Open the flat file in write mode

  • Use file handling functions to write the file name into the flat file

  • Close the flat file

Add your answer

Q130. how to generate sequence from wf to mapping

Ans.

To generate sequence from wf to mapping, use a mapping transformation in the integration tool.

  • Create a mapping transformation in the integration tool

  • Add the workflow as a source in the mapping

  • Add the target mapping as the target in the mapping

  • Map the fields from the workflow to the target mapping

  • Execute the mapping to generate the sequence in the target mapping

Add your answer

Q131. How is the role of a Product Owner different from a Scrum Master?

Ans.

Product Owner defines what to build, Scrum Master ensures the team builds it effectively.

  • Product Owner is responsible for defining and prioritizing the product backlog

  • Scrum Master is responsible for facilitating the Scrum process and removing impediments

  • Product Owner represents the stakeholders and communicates their needs to the team

  • Scrum Master coaches the team on Agile principles and helps them self-organize

  • Product Owner focuses on the 'what' and 'why' of the product

  • Scrum ...read more

Add your answer

Q132. How do you do reports, and how do you consolidate reports from different sources?

Ans.

I use a standardized format for reports and consolidate data using tools like Excel or Tableau.

  • I use a consistent format for all reports to ensure clarity and ease of understanding.

  • I gather data from various sources and use tools like Excel or Tableau to consolidate it.

  • I ensure that all data is accurate and up-to-date before consolidating it.

  • I create visualizations to help convey the data in a clear and concise manner.

  • I collaborate with team members to ensure that all necessa...read more

Add your answer

Q133. 1) how to do version comparison in Smartforms.

Ans.

Version comparison in Smartforms

  • Use the 'Version Management' option in Smartforms

  • Select the form and click on 'Versions' button

  • Compare the versions and select the desired one

  • Preview and save the form with the selected version

Add your answer

Q134. So, why did you focus on developing ppt more Visually.

Ans.

Visual aids enhance audience engagement and comprehension.

  • Visuals help break up text-heavy slides

  • Images and graphics can convey complex information quickly

  • Animations and transitions add interest and keep audience focused

  • Visuals can help reinforce key points and improve retention

  • Effective use of color and design can enhance overall presentation

  • Visuals can help accommodate different learning styles

  • Visuals can make a presentation more memorable and impactful

Add your answer

Q135. You have a background with Oracle, so is there a s preference of working on oracle over SAP?

Ans.

There is no preference of working on Oracle over SAP based on my background.

  • Both Oracle and SAP have their own strengths and weaknesses.

  • The choice between Oracle and SAP depends on the specific requirements of the project or organization.

  • Oracle is known for its robust database management system and comprehensive suite of business applications.

  • SAP, on the other hand, is renowned for its integrated enterprise resource planning (ERP) solutions.

  • It is important to evaluate factors...read more

View 1 answer

Q136. What are the three key artefacts of scrum

Ans.

The three key artefacts of Scrum are Product Backlog, Sprint Backlog, and Increment.

  • Product Backlog: prioritized list of features or requirements

  • Sprint Backlog: list of tasks to be completed during a sprint

  • Increment: the sum of all completed product backlog items at the end of a sprint

  • All three artefacts are essential for successful implementation of Scrum

Add your answer

Q137. Architecture and functionalities of BeyondTrust PowerBroker

Ans.

BeyondTrust PowerBroker is a privileged access management solution that provides control over user access to critical systems and data.

  • PowerBroker allows organizations to manage and control privileged access across multiple platforms, including Windows, Unix, Linux, and Mac OS.

  • It provides granular access control, allowing administrators to define policies based on user roles and responsibilities.

  • PowerBroker also includes auditing and reporting capabilities, enabling organizat...read more

Add your answer

Q138. What is transfer pricing and its different methods?

Ans.

Transfer pricing is the practice of determining the value of goods or services exchanged between related entities in different tax jurisdictions.

  • Transfer pricing is used to determine the price of goods or services transferred between related entities in different countries.

  • It is important for companies to ensure that transfer pricing is done at arm's length, meaning the price is similar to what would be charged between unrelated parties.

  • There are several methods of transfer p...read more

Add your answer

Q139. How would you use Data Analytics to device a solution so that school kids reach to school and back home safely and on time without the parents being worried

Ans.

Utilize data analytics to ensure safe and timely transportation for school kids without parents' worry

  • Collect data on traffic patterns and congestion to optimize bus routes

  • Implement GPS tracking on buses to monitor their location in real-time

  • Utilize predictive analytics to anticipate potential delays and adjust schedules accordingly

  • Create a communication platform for parents to receive updates on their child's transportation status

  • Analyze historical data to identify common is...read more

Add your answer

Q140. Why would a company choose Agile methodology over waterfall methodology ?

Ans.

Agile methodology allows for flexibility, faster delivery, and continuous improvement compared to the rigid and sequential approach of waterfall methodology.

  • Agile allows for continuous feedback and adaptation, while waterfall is a linear process

  • Agile promotes collaboration and communication between team members and stakeholders

  • Agile enables faster delivery of working software in smaller increments

  • Agile allows for changes to be made throughout the development process, while wa...read more

Add your answer

Q141. What are mutable and immutable data types?

Ans.

Mutable data types can be changed after creation, while immutable data types cannot be changed.

  • Mutable data types include lists, dictionaries, and sets.

  • Immutable data types include strings, tuples, and frozensets.

  • Changing a mutable data type will modify the original object, while changing an immutable data type will create a new object.

  • Example: changing a list by appending an element will modify the original list, while concatenating two strings will create a new string.

Add your answer

Q142. Explain how you test a change management control when the application doesn't store the updates log.

Ans.

Testing change management control without update log

  • Create a test environment to simulate the change

  • Document the change and expected outcome

  • Perform the change and observe the system behavior

  • Compare the system behavior with the expected outcome

  • Repeat the process with different scenarios

  • Use version control to track changes

View 1 answer

Q143. 12) What is rest-assured? How to handle the certificate issues in rest-assured?

Ans.

Rest-assured is a Java-based library used for testing RESTful APIs.

  • Rest-assured simplifies the testing of RESTful APIs by providing a domain-specific language (DSL) for writing tests.

  • To handle certificate issues in rest-assured, we can use the relaxedHTTPSValidation() method to bypass SSL certificate validation.

  • We can also import the certificate into the truststore and use it for SSL validation.

Add your answer

Q144. How Test cases are reported to stakeholders ?

Ans.

Test cases are reported to stakeholders through detailed reports and presentations.

  • Test cases are documented and organized in a clear and concise manner.

  • Reports are created to summarize the test results and highlight any issues or concerns.

  • Presentations are given to stakeholders to provide an overview of the testing process and results.

  • Communication with stakeholders is ongoing throughout the testing process to ensure transparency and collaboration.

  • Examples of test case repor...read more

Add your answer

Q145. Write a function to normalise a decimal number without using math functions.

Ans.

Function to normalise a decimal number without using math functions.

  • Extract the integer and decimal parts of the number

  • Count the number of digits in the decimal part

  • Multiply the decimal part by 10^number of decimal digits to convert it to an integer

  • Add the integer and converted decimal parts and return the result

Add your answer

Q146. Can we create composite unique keys on multiple columns in a single table

Ans.

Yes, composite unique keys can be created on multiple columns in a single table.

  • Composite unique keys are useful for ensuring data integrity and preventing duplicates.

  • Syntax: CREATE TABLE table_name (column1 datatype, column2 datatype, ..., CONSTRAINT constraint_name UNIQUE (column1, column2, ...));

  • Example: CREATE TABLE employees (id INT, name VARCHAR(50), email VARCHAR(50), CONSTRAINT emp_unique UNIQUE (id, email));

Add your answer

Q147. What is the use of JVM in Java?

Ans.

JVM is the virtual machine that executes Java bytecode. It provides platform independence and memory management.

  • JVM stands for Java Virtual Machine

  • It interprets compiled Java code into machine language

  • JVM provides platform independence by executing bytecode on any platform

  • It manages memory allocation and garbage collection

  • Examples of JVM-based languages include Kotlin and Scala

View 1 answer

Q148. How would you select samples from 300 ledger accounts? If an account had 1000 entries worth one million dollars, how would you obtain reasonable assurance that they are correct?

Ans.

To select samples from 300 ledger accounts, I would use statistical sampling techniques and stratification.

  • I would stratify the accounts based on their size, activity, and risk level.

  • I would then use statistical sampling techniques such as random sampling or systematic sampling to select a representative sample from each stratum.

  • For the account with 1000 entries worth one million dollars, I would use monetary unit sampling to select a sample of entries based on their dollar v...read more

Add your answer

Q149. How would arrive at a conclusion to a complex question?

Ans.

I would gather relevant information, analyze data, consult with experts, consider different perspectives, and use critical thinking to arrive at a conclusion.

  • Gather all relevant information related to the complex question

  • Analyze data and statistics to identify patterns and trends

  • Consult with subject matter experts to gain insights and perspectives

  • Consider different viewpoints and arguments before forming a conclusion

  • Utilize critical thinking skills to evaluate the information...read more

Add your answer

Q150. What are the basic differences between the different types of SQL joins?

Ans.

SQL joins are used to combine rows from two or more tables based on a related column between them.

  • INNER JOIN: Returns records that have matching values in both tables.

  • LEFT JOIN: Returns all records from the left table and the matched records from the right table.

  • RIGHT JOIN: Returns all records from the right table and the matched records from the left table.

  • FULL JOIN: Returns all records when there is a match in either left or right table.

  • CROSS JOIN: Returns the Cartesian pro...read more

Add your answer

Q151. Explain Inheritance and how you have implemented inheritance in your work?

Ans.

Inheritance is a concept in object-oriented programming where a class inherits properties and behaviors from another class.

  • Inheritance allows for code reuse and promotes modularity.

  • The class that is being inherited from is called the superclass or base class.

  • The class that inherits from the superclass is called the subclass or derived class.

  • The subclass inherits all the public and protected members of the superclass.

  • Inheritance is implemented using the 'extends' keyword in la...read more

Add your answer

Q152. Example, when your are script writer. How do you establish connection to DB?

Ans.

Establishing connection to a DB as a script writer.

  • Choose a suitable programming language for the task

  • Install the necessary database driver

  • Provide the correct credentials for the database

  • Test the connection before proceeding with the script

Add your answer

Q153. How would you integrate Primavera with SAP?

Ans.

Integrating Primavera with SAP involves establishing a data exchange between the two systems to ensure seamless project management and financial integration.

  • Identify the data to be exchanged between Primavera and SAP

  • Map the data fields and establish a data mapping strategy

  • Implement an integration solution using middleware or custom development

  • Test and validate the integration to ensure data accuracy and consistency

  • Establish a monitoring and maintenance plan for ongoing integr...read more

View 1 answer

Q154. Knowledge Management is a growing field. You are a smaller company going up against a more established one. What would you do?

Ans.

Establish a niche and focus on personalized service to differentiate from the larger company.

  • Identify a specific area of knowledge management where the larger company may not be as strong

  • Offer personalized service and tailored solutions to clients

  • Leverage technology to streamline processes and improve efficiency

  • Build a strong online presence through social media and content marketing

  • Partner with other smaller companies to offer a wider range of services

Add your answer

Q155. what are access specifiers in c++

Ans.

Access specifiers in C++ are keywords that determine the visibility and accessibility of class members.

  • There are three access specifiers in C++: public, private, and protected.

  • Public members are accessible from anywhere in the program.

  • Private members are only accessible within the class itself.

  • Protected members are accessible within the class and its derived classes.

  • Access specifiers are used to enforce encapsulation and control the access to class members.

View 1 answer

Q156. Informatica lookup transformation, difference between static and dynamic lookup.

Ans.

Static and dynamic lookup in Informatica

  • Static lookup caches the lookup table data at the beginning of the session while dynamic lookup caches data as required during the session

  • Static lookup is faster but consumes more memory while dynamic lookup is slower but consumes less memory

  • Static lookup is used when the lookup table is small and doesn't change frequently while dynamic lookup is used when the lookup table is large or changes frequently

Add your answer

Q157. 9) When an Asset increases it must be debited or credited?

Ans.

When an asset increases, it must be debited.

  • Debit increases assets and credit decreases assets.

  • Assets include cash, accounts receivable, inventory, property, and equipment.

  • For example, if a company purchases a new machine, the asset account for machinery will be debited to increase it.

  • This is based on the accounting equation: Assets = Liabilities + Equity.

Add your answer

Q158. How do you connect multi VPC without the use of a transit gateway?

Ans.

Multi VPCs can be connected using VPC peering or VPN connections.

  • VPC peering allows direct communication between VPCs using private IP addresses.

  • VPN connections can be established between VPCs using virtual private gateways.

  • Routing tables need to be updated to allow traffic flow between VPCs.

  • Security groups and network ACLs need to be configured to allow traffic between VPCs.

  • AWS Transit Gateway can also be used to connect multiple VPCs.

  • VPC peering and VPN connections have lim...read more

Add your answer

Q159. How you load 1 million record without any external tool

Ans.

Use batch processing and optimized SQL queries to load 1 million records without external tools.

  • Utilize batch processing to insert records in chunks rather than individually

  • Optimize SQL queries for efficient data loading

  • Consider using stored procedures for faster data insertion

Add your answer

Q160. What is raml? difference between fragments and traits

Ans.

RAML is a RESTful API Modeling Language used to describe APIs. Fragments are reusable parts of RAML files, while traits are reusable sets of properties and methods.

  • RAML is a language for describing APIs in a structured way

  • Fragments in RAML are reusable parts of RAML files that can be included in multiple API definitions

  • Traits in RAML are reusable sets of properties and methods that can be applied to multiple resources or methods

  • Fragments and traits help in reducing duplicatio...read more

Add your answer

Q161. Is Javascript a single/multi threaded language? If single threaded then how does backend calls work?

Ans.

Javascript is a single-threaded language, but it can handle asynchronous operations through callbacks and promises.

  • Javascript is single-threaded, meaning it can only execute one task at a time.

  • However, it can handle asynchronous operations by using callbacks, promises, and async/await.

  • Backend calls in Javascript are typically made using asynchronous functions, allowing the program to continue executing other tasks while waiting for the response.

  • For example, when making an HTT...read more

Add your answer

Q162. What is DLP? Explain its working.

Ans.

DLP stands for Data Loss Prevention. It is a security solution that helps prevent sensitive data from being leaked or lost.

  • DLP works by identifying and classifying sensitive data, such as credit card numbers or social security numbers.

  • It then monitors the flow of this data, both within the organization and outside of it.

  • If it detects any unauthorized attempts to access or transmit this data, it can take action to prevent it.

  • Examples of DLP solutions include endpoint protectio...read more

Add your answer

Q163. State all the differences which are possible and also the application of both the relationships.

Ans.

There are different types of relationships possible with varying degrees of commitment and intimacy. Each has its own application.

  • Types of relationships: casual, romantic, platonic, familial, professional

  • Casual relationships are low-commitment and often short-term

  • Romantic relationships involve emotional and physical intimacy

  • Platonic relationships are non-romantic and non-sexual

  • Familial relationships are based on blood or legal ties

  • Professional relationships are based on work ...read more

Add your answer

Q164. Guesstimate the market size of my client based on the information I knew.

Ans.

Market size guesstimate for client

  • Need more information on client's industry and target market

  • Assuming client operates in the US, estimate total addressable market (TAM) for their product/service

  • Calculate client's market share based on revenue or customer base

  • Consider potential growth opportunities and market trends

  • Final estimate should be based on a range of scenarios

Add your answer

Q165. how will you handle a situation when client is unhappy with ur product

Ans.

I would address the client's concerns promptly and work towards finding a solution to meet their needs.

  • Listen to the client's feedback and understand their specific concerns

  • Apologize for any inconvenience caused and assure them that their feedback is valued

  • Offer potential solutions or alternatives to address their dissatisfaction

  • Follow up with the client to ensure that the issue has been resolved to their satisfaction

Add your answer

Q166. What are 5 heads of income? What is depreciation and types? What is accrued interest?

Ans.

The 5 heads of income are salary, house property, business/profession, capital gains, and other sources.

  • Salary income includes income from employment

  • House property income includes rental income

  • Business/profession income includes income from self-employment

  • Capital gains income includes profits from sale of assets

  • Other sources income includes income from sources not covered under the other heads

  • Depreciation is the decrease in value of an asset over time

  • Types of depreciation inc...read more

Add your answer

Q167. Movement types and transaction event keys in Subcontracting process?

Ans.

In subcontracting process, movement types and transaction event keys are used to track the movement of materials between the subcontractor and the company.

  • Movement type 541 is used to transfer raw materials to the subcontractor

  • Movement type 542 is used to receive the finished goods from the subcontractor

  • Transaction event key WE is used for goods issue to the subcontractor

  • Transaction event key WA is used for goods receipt from the subcontractor

View 3 more answers

Q168. what is the difference between designing a website and a mobile application?

Ans.

Designing a website and a mobile application differ in terms of screen size, user behavior, and functionality.

  • Screen size: Mobile screens are smaller, so the design should be optimized for smaller screens.

  • User behavior: Mobile users tend to interact differently than website users, so the design should be tailored to their behavior.

  • Functionality: Mobile apps can take advantage of device features like GPS and camera, while websites cannot.

  • Examples: A website may have a navigati...read more

Add your answer

Q169. How to install SCCM Client if the machine is not in VPN and Organization network?

Ans.

SCCM client can be installed using internet-based client management or cloud management gateway.

  • Use internet-based client management to install SCCM client over the internet.

  • Configure cloud management gateway to install SCCM client from the cloud.

  • Ensure that the client has internet connectivity and proper authentication credentials.

  • Use client push installation method or manual installation method.

  • In manual installation method, download the client installation package and run ...read more

Add your answer

Q170. How do you print multiple logo from a single template

Ans.

To print multiple logos from a single template, use a batch processing tool or create a script to automate the process.

  • Use a batch processing tool like Adobe Photoshop's Batch Processing feature to apply the template to multiple logos at once.

  • Create a script using a programming language like Python to automate the process of applying the template to multiple logos.

  • Ensure that the logos are in a compatible file format for the template.

  • Adjust the template as necessary to fit ea...read more

Add your answer

Q171. Tell me the five criterias to recognise revenue as per Ind As 115

Ans.

The five criteria to recognize revenue as per Ind AS 115 are identification of contract, identification of performance obligations, determination of transaction price, allocation of transaction price, and recognition of revenue when performance obligations are satisfied.

  • Identification of contract

  • Identification of performance obligations

  • Determination of transaction price

  • Allocation of transaction price

  • Recognition of revenue when performance obligations are satisfied

Add your answer

Q172. What are business rules constructed using?

Ans.

Business rules are constructed using logic and conditions.

  • Logic

  • Conditions

  • Constraints

  • Decision tables

  • Rule engines

Add your answer

Q173. Explain Compile time and Run time polymorphism with Example

Ans.

Compile time polymorphism is achieved through function overloading and operator overloading, while run time polymorphism is achieved through virtual functions and inheritance.

  • Compile time polymorphism is resolved during compile time based on the number and types of arguments passed to a function. Example: function overloading.

  • Run time polymorphism is resolved during runtime based on the actual object type. Example: virtual functions in inheritance.

  • Compile time polymorphism is...read more

Add your answer

Q174. Which all technology you have came across?

Ans.

I have experience with a wide range of technologies including Java, Python, SQL, AWS, Docker, and Kubernetes.

  • Java

  • Python

  • SQL

  • AWS

  • Docker

  • Kubernetes

Add your answer

Q175. What are the roles associated with Scrum ?

Ans.

Scrum roles include Product Owner, Scrum Master, and Development Team.

  • Product Owner is responsible for defining and prioritizing the product backlog.

  • Scrum Master facilitates the Scrum process and ensures adherence to Scrum principles.

  • Development Team is responsible for delivering a potentially releasable product increment at the end of each sprint.

Add your answer

Q176. On resume- difference between html5 and its previous version?

Ans.

HTML5 is the latest version of HTML with new features and improvements.

  • HTML5 has new semantic tags like

    ,
    ,
  • HTML5 supports audio and video elements without the need for plugins.

  • HTML5 has improved form elements like date pickers, range sliders, etc.

  • HTML5 has improved canvas and SVG support for graphics.

  • HTML5 has improved accessibility features.

  • HTML5 has improved support for mobile devices.

  • Previous versions of HTML did not have these features.

Add your answer

Q177. Guestimate: Estimate the number of MRI scanners in India.

Ans.

Estimating the number of MRI scanners in India.

  • Research the population of India and the number of MRI scanners per capita in other countries.

  • Consider the number of hospitals and medical facilities in India.

  • Take into account the healthcare infrastructure and accessibility in different regions of India.

  • Consult industry reports and statistics on the healthcare sector in India.

  • Consider the growth rate of MRI scanner installations in recent years.

Add your answer

Q178. Describe your journey from Data Science to Consulting.

Ans.

Transitioned from Data Science to Consulting by leveraging analytical skills and business acumen.

  • Developed expertise in data analysis and modeling through academic and professional experience.

  • Recognized the importance of understanding business objectives and translating data insights into actionable recommendations.

  • Built strong communication and presentation skills to effectively convey complex information to clients.

  • Collaborated with cross-functional teams to deliver solutio...read more

Add your answer

Q179. Design a ticket booking system on the lines of book my show.

Ans.

A ticket booking system similar to BookMyShow

  • User registration and login

  • Event listing and selection

  • Seat selection and payment

  • Confirmation and ticket generation

  • Integration with payment gateways

  • Admin panel for event and user management

Add your answer

Q180. CASE STUDIE:- CALCULATE REVENUE OF ICE CREAM PARLOUR

Ans.

To calculate revenue of an ice cream parlor, we need to consider factors like sales volume, pricing strategy, and operational costs.

  • Determine the average number of customers per day and the average amount spent per customer

  • Consider the cost of ingredients, labor, rent, and utilities

  • Analyze the competition and adjust pricing strategy accordingly

  • Explore opportunities for upselling and cross-selling

  • Track sales and expenses regularly to identify trends and make informed decisions

Add your answer

Q181. What are webhooks in shopify?

Ans.

Webhooks in Shopify are notifications sent to a URL when certain events occur in a store.

  • Webhooks allow apps to receive real-time data about events in a Shopify store

  • Developers can use webhooks to automate tasks or trigger actions based on specific events

  • Examples of events that can trigger webhooks include order creation, product updates, and customer registration

Add your answer

Q182. How do you do ageing analysis/how do you prepare bills payables

Ans.

Ageing analysis is done by categorizing bills payables by their due dates and calculating the number of days past due.

  • Sort bills payables by due date

  • Categorize bills payables by age (e.g. 0-30 days past due, 31-60 days past due, etc.)

  • Calculate the total amount of bills payables in each age category

  • Analyze the trend of bills payables aging over time

  • Prepare a report to show the ageing analysis results

Add your answer

Q183. What is acceptance testing and who do beta testing ?

Ans.

Acceptance testing is a type of testing to ensure that the software meets the customer's requirements. Beta testing is done by end-users.

  • Acceptance testing is done to ensure that the software meets the customer's requirements

  • It is usually done by the customer or a representative of the customer

  • Beta testing is done by end-users to identify any issues before the software is released to the public

  • Beta testing is usually done in a real-world environment

  • Both acceptance testing and...read more

Add your answer

Q184. Write some LINQ statements which are used for String and DataTable manipulations

Ans.

LINQ statements for String and DataTable manipulations

  • For String manipulations, use methods like Where, Select, OrderBy, GroupBy, etc.

  • For DataTable manipulations, use methods like Where, Select, OrderBy, GroupBy, Join, etc.

  • Use lambda expressions to specify the conditions for filtering, sorting, grouping, etc.

  • Example: var result = myStringArray.Where(s => s.Length > 5).OrderBy(s => s);

  • Example: var result = myDataTable.Where(row => row.Field("Age") > 18).Select(row => row.Field...read more

Add your answer

Q185. What is the difference between the Master-Detail and Lookup relationship?

Ans.

Master-Detail is a parent-child relationship where the child record cannot exist without the parent. Lookup is a simple reference relationship.

  • Master-Detail relationship is a stricter form of relationship where the child record inherits the security and sharing settings of the parent record.

  • In a Master-Detail relationship, deleting the parent record will delete all the child records associated with it.

  • Lookup relationship is a simpler form of relationship where the child recor...read more

Add your answer

Q186. Would you work differently with competitors data as opposed to own data?

Ans.

Yes, competitor data requires additional scrutiny and validation before use.

  • Competitor data may not be as reliable as own data

  • Competitor data may have different methodologies or definitions

  • Competitor data may require additional validation and verification

  • Competitor data may require additional legal considerations

  • Own data may be more readily available and easier to use

Add your answer

Q187. 10) When equity decreases it must be debited or credited?

Ans.

Equity decreases must be debited.

  • Equity is a credit balance account, so when it decreases, it must be debited to reduce the credit balance.

  • Debiting equity reduces the owner's or shareholder's equity in the business.

  • Examples of equity decreasing transactions include paying dividends, recording losses, or issuing treasury stock.

Add your answer

Q188. An auto after sales company is not doing well. It has been found that their supply chain solution might not be very effective. They are considering 2 more options in redesigning their supply chain. Should they ...

read more
Ans.

Yes, they should change their supply chain solution.

  • The current supply chain solution is not effective, which is impacting the company's performance.

  • Changing the supply chain can lead to improved efficiency, cost reduction, and customer satisfaction.

  • Consider the potential benefits and drawbacks of each option before making a decision.

  • Examples of options could include implementing a new inventory management system or outsourcing logistics operations.

Add your answer

Q189. What is the ticketing tool used in your project

Ans.

The ticketing tool used in our project is JIRA.

  • JIRA is a popular project management tool used for issue tracking and agile project management.

  • It allows for creating, tracking, and managing tasks and issues throughout the project lifecycle.

  • Users can prioritize, assign, and track progress of tasks using JIRA.

  • JIRA also offers customizable workflows and reporting features for better project management.

  • Example: We use JIRA to create and track user stories, bugs, and tasks in our s...read more

Add your answer

Q190. New technology in the field of semiconductor industry?

Ans.

The semiconductor industry is constantly evolving with new technologies such as AI, IoT, and 5G driving innovation.

  • AI is being used to improve chip design and manufacturing processes

  • IoT is driving demand for low-power and high-performance chips

  • 5G is increasing demand for high-speed and low-latency chips

  • Emerging technologies such as quantum computing and neuromorphic computing are being explored for future applications

Add your answer

Q191. Coding problem like swapping two variables without a third one

Ans.

Swapping two variables without a third one using XOR operation

  • Use XOR operation to swap two variables without a third one

  • Example: a = 5, b = 10. a ^= b; b ^= a; a ^= b; // Now a = 10, b = 5

Add your answer

Q192. Write a program to sort an array, half in ascending and half in descending

Ans.

Program to sort an array, half ascending and half descending

  • Split the array into two halves

  • Sort the first half in ascending order and the second half in descending order

  • Merge the two sorted halves back together

Add your answer

Q193. What is EDR? Explain its working.

Ans.

EDR stands for Endpoint Detection and Response. It is a cybersecurity technology that detects and responds to threats on endpoints.

  • EDR monitors endpoint activity for suspicious behavior

  • It uses machine learning and behavioral analysis to identify threats

  • EDR can isolate infected endpoints and contain the threat

  • Examples of EDR solutions include CrowdStrike, Carbon Black, and SentinelOne

Add your answer

Q194. Come up with a scenario and how will you design an elearning material.

Ans.

Designing an elearning material for customer service representatives on handling difficult customers.

  • Identify common difficult customer scenarios

  • Provide strategies for de-escalating situations

  • Include interactive scenarios for practice

  • Incorporate real-life examples and case studies

  • Include assessments to measure understanding

  • Use engaging multimedia elements

  • Ensure accessibility for all learners

Add your answer

Q195. How do you manage application state?

Ans.

Application state is managed through various techniques such as Redux, Context API, and local state.

  • Redux is a popular state management library that allows for a centralized store of application state.

  • Context API is a built-in React feature that allows for sharing state between components without the need for props drilling.

  • Local state can be used for managing state within a single component.

  • Other techniques include using third-party libraries like MobX or implementing the Fl...read more

Add your answer

Q196. What do u mean by DNS?

Ans.

DNS stands for Domain Name System, which is a system that translates domain names into IP addresses.

  • DNS is used to locate websites and other resources on the internet.

  • It works by translating human-readable domain names into machine-readable IP addresses.

  • DNS servers store information about domain names and their corresponding IP addresses.

  • Examples of DNS servers include Google DNS, OpenDNS, and Cloudflare DNS.

Add your answer

Q197. What do you think telecom operators should do to prevent this problem?

Ans.

Telecom operators should invest in robust network infrastructure and implement strict security measures to prevent problems.

  • Invest in upgrading network infrastructure to handle increasing data traffic

  • Implement strong security measures to protect against cyber threats

  • Regularly monitor and analyze network performance to identify and address potential issues

  • Provide reliable customer support to promptly address customer complaints and concerns

  • Offer competitive pricing and attract...read more

Add your answer

Q198. what is a Kernel in OS

Ans.

Kernel is the core component of an operating system that manages system resources and provides a bridge between hardware and software.

  • Kernel is responsible for managing memory, processes, and device drivers.

  • It provides an interface for applications to access hardware resources.

  • Kernel operates in privileged mode and has direct access to the hardware.

  • Examples of popular kernels are Linux kernel, Windows NT kernel, and macOS kernel.

View 1 answer

Q199. Explain your projects !! Which Programming languages do u know ? Write a program of your choice in your preferred programming language !! What are your long term goals ? What are your preferred technologies ?

Ans.

I have worked on multiple projects using various programming languages. My long term goal is to become a data analyst and my preferred technologies are Python and SQL.

  • Projects: E-commerce website using PHP, Inventory management system using Java, Data analysis of customer behavior using Python

  • Programming languages: Python, Java, PHP, SQL

  • Program: Python program to calculate the factorial of a number

  • Long term goal: To become a data analyst

  • Preferred technologies: Python and SQL

Add your answer

Q200. How is EPM different from EEPM?

Ans.

EPM stands for Enterprise Performance Management, while EEPM stands for Extended Enterprise Performance Management.

  • EPM focuses on managing and improving the performance of an entire organization.

  • EEPM extends the scope of EPM to include external stakeholders such as suppliers, partners, and customers.

  • EPM typically involves financial planning, budgeting, forecasting, and reporting.

  • EEPM goes beyond financial aspects and includes collaboration, data sharing, and performance monit...read more

View 1 answer
1
2
3
4
5
6
7
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Invictus Digisoft

based on 1.2k interviews in the last 1 year
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.9
 • 318 Interview Questions
4.2
 • 203 Interview Questions
4.0
 • 200 Interview Questions
4.1
 • 153 Interview Questions
4.2
 • 135 Interview Questions
View all
Top Deloitte Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter