Deloitte
1500+ Invictus Digisoft Interview Questions and Answers
Q101. 2) what is SDLC (Software Development Life Cycle) how it helps?
SDLC is a process followed by software development teams to design, develop and test high-quality software.
SDLC is a structured approach to software development.
It involves several phases such as planning, analysis, design, implementation, testing, and maintenance.
It helps in delivering high-quality software that meets customer requirements.
It ensures that the software is developed within budget and on time.
It helps in identifying and resolving issues early in the development...read more
Q102. What is Close-Ended Mutual Fund?
A mutual fund with a fixed number of shares, traded on an exchange like a stock.
Investors buy and sell shares of the fund on the exchange
The price of the shares is determined by supply and demand
The fund is managed by a professional portfolio manager
Examples include index funds and ETFs
Q103. What is functional testing and its types ?
Functional testing is a type of testing that verifies if the software meets the specified requirements.
It focuses on the functionality of the software
It is performed to ensure that the software meets the business requirements
Types of functional testing include unit testing, integration testing, system testing, and acceptance testing
Examples of functional testing tools include Selenium, HP QuickTest Professional, and IBM Rational Functional Tester
Q104. How can you troubleshoot Disk corrupt issue.
To troubleshoot disk corrupt issue, check disk errors, run chkdsk, repair disk, and recover data.
Check for disk errors using Event Viewer or Disk Utility
Run chkdsk command to scan and fix disk errors
Repair disk using disk repair tool or reinstalling OS
Recover data using data recovery software or professional services
Q105. Estimate the number of Denims sold in a year in India.
Estimating the number of Denims sold in a year in India.
Research the population of India and estimate the percentage of people who wear denims.
Consider factors like age group, income levels, and fashion trends.
Analyze the market share of denim brands and their sales data.
Study the growth rate of the fashion industry in India.
Take into account the demand for denims in different regions of India.
Consider the impact of online shopping and e-commerce platforms on denim sales.
Cons...read more
Q106. Our client is an established pharma company and wants to see if entering the sanitizer market is commercially viable for them. Help us.
Entering the sanitizer market can be commercially viable for the established pharma company.
An established pharma company already has the necessary infrastructure and expertise to produce sanitizers.
The demand for sanitizers has significantly increased due to the COVID-19 pandemic.
The company can leverage its existing distribution channels and customer base to promote and sell sanitizers.
Sanitizers can be a complementary product to the company's existing pharmaceutical offeri...read more
Q107. Difference between solution with requirement gathering and solution based on SAP best practices.
Solution with requirement gathering involves customizing the solution to meet specific needs, while solution based on SAP best practices follows pre-defined industry standards.
Solution with requirement gathering involves understanding the specific needs and goals of the client.
It requires gathering detailed requirements through interviews, workshops, and documentation.
The solution is then customized and tailored to meet those specific requirements.
This approach allows for fle...read more
Q108. What is Encapsulation and Polymorphism in OO ABAP?
Encapsulation is the concept of hiding implementation details and exposing only necessary information. Polymorphism is the ability of objects to take on multiple forms.
Encapsulation helps in achieving data security and prevents unauthorized access to data.
Polymorphism allows objects to be treated as instances of their own class or as instances of their parent class.
Encapsulation and Polymorphism are key concepts in Object-Oriented Programming.
Example of Encapsulation: Private...read more
Q109. What’s the relation between pointers and Security?
Pointers are used in programming to manage memory and can be a potential security vulnerability if not handled properly.
Pointers allow direct access to memory locations, making it possible to manipulate data or execute arbitrary code.
Improper use of pointers can lead to buffer overflows, memory leaks, and other security vulnerabilities.
Pointers can be exploited by attackers to gain unauthorized access, execute malicious code, or crash a system.
Examples of pointer-related secu...read more
Q110. Guesstimate: Our client owns a mine of Limestone at Meghalaya (90 sq. Km).Guesstimate no. of years' limestone can be extracted from the mine. (35 minutes)
Guesstimate the number of years limestone can be extracted from a 90 sq. km mine in Meghalaya.
Determine the total amount of limestone in the mine
Estimate the annual extraction rate based on current technology and demand
Consider any potential changes in technology or demand in the future
Factor in any environmental or regulatory constraints
Assuming a constant extraction rate, calculate the number of years until depletion
Q111. If a task approaches a deadline and scrum team tells you that we cannot deliver a particular part of the sprint backlog. As business analyst how will you plan and take care of this situation
As a business analyst, I will prioritize the remaining tasks and work with the scrum team to find a solution.
Assess the impact of the missed task on the overall sprint goal
Prioritize the remaining tasks based on their importance to the sprint goal
Collaborate with the scrum team to find a solution, such as extending the sprint or removing less critical tasks
Communicate the impact of the missed task to stakeholders and adjust expectations accordingly
Q112. What is different ways of identification in tosca? What os exploratory testing? What is module based testing? What are standard modules available in tosca? Syntax for date time format?
Tosca offers multiple ways of identification including visual recognition, object recognition, and text recognition.
Visual recognition identifies objects based on their appearance
Object recognition identifies objects based on their properties and attributes
Text recognition identifies objects based on their text content
Module based testing involves testing individual modules of an application separately
Standard modules in Tosca include Test Case Design, Test Data Management, a...read more
Q113. What is call by value and call by reference?
Call by value and call by reference are two ways of passing arguments to a function.
Call by value passes a copy of the argument's value to the function.
Call by reference passes a reference to the argument's memory location to the function.
Call by value is used for simple data types like int, float, etc.
Call by reference is used for complex data types like arrays, structures, etc.
Q114. What are the 7 layers in OSI model of Networking?
The OSI model has 7 layers that define how data is transmitted over a network.
The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and communicates with the layers above and below it.
For example, the Physical layer deals with the physical transmission of data, while the Application layer deals with user interfaces and applications.
The OSI model is a conceptual model and is not always followed exactl...read more
Q115. How will you Interpret VIF in linear regression?
VIF (Variance Inflation Factor) measures multicollinearity in linear regression by quantifying how much the variance of the estimated regression coefficients is inflated due to collinearity.
VIF values greater than 10 indicate high multicollinearity, suggesting that the independent variables are highly correlated.
VIF values close to 1 indicate low multicollinearity, meaning the independent variables are not highly correlated.
To calculate VIF, each independent variable is regre...read more
Q116. 15) What are the things need to post a value in server?
To post a value in a server, you need to consider the endpoint, request method, headers, body, and authentication.
Identify the endpoint where the value needs to be posted
Choose the appropriate request method (e.g., POST)
Set the necessary headers (e.g., Content-Type)
Construct the body payload with the value to be posted
Handle authentication if required (e.g., API key, token)
Q117. 16) What are the exception you are facing in selenium automation?
Common exceptions in Selenium automation include NoSuchElementException, TimeoutException, and StaleElementReferenceException.
NoSuchElementException occurs when an element cannot be found in the DOM.
TimeoutException occurs when a command takes longer than the timeout value to complete.
StaleElementReferenceException occurs when an element is no longer attached to the DOM.
Other exceptions include ElementNotVisibleException, ElementNotSelectableException, and WebDriverException.
Q118. What are features of EPIC ?What is Persona in Analysis?
EPIC is an electronic health record system. Persona is a fictional character representing a user group in analysis.
EPIC features include patient records, clinical decision support, and billing.
Persona is used in user-centered design to represent the needs and behaviors of a user group.
Persona helps in creating user stories and designing user interfaces.
Example: A persona for a hospital nurse may include information about their job responsibilities, technology proficiency, and...read more
Q119. how to create dynamic tgt files dept wise
Dynamic tgt files can be created dept wise using scripting languages and database queries.
Identify the data fields required for the tgt files
Create a database query to extract the required data for each department
Use a scripting language like Python or Perl to automate the process of creating the tgt files
Ensure that the script is dynamic and can handle changes in the data or department structure
Test the script thoroughly before implementing it in a production environment
Q120. Can we achieve multiple inheritance in ABAP?
No, ABAP does not support multiple inheritance.
ABAP only supports single inheritance through the use of interfaces and abstract classes.
Multiple inheritance can lead to ambiguity and complexity in the code.
However, ABAP does allow for the implementation of multiple interfaces.
Example: a class can implement both IF_A and IF_B interfaces.
Q121. Can we have multiple constructors for a class?
Yes, a class can have multiple constructors with different parameters.
Constructors are used to initialize objects of a class.
Multiple constructors can be defined with different parameters.
The constructor with the matching parameters is called when an object is created.
Constructors can also call other constructors using 'this' keyword.
Example: public class MyClass { public MyClass() {} public MyClass(int x) {} }
Q122. Documents used to procure using Central purchase Organisation?
Purchase requisition and purchase order are the documents used to procure using Central purchase Organisation.
Purchase requisition is used to request materials or services from a vendor
Purchase order is a legal document that authorizes the purchase transaction
Central purchase organization is responsible for procurement for multiple plants or company codes
Purchase requisition and purchase order are created in SAP MM module
Q123. Later we discussed two guesstimates, both on interests. Count the number of potholes on the roads of your hometown
I estimate there are around 10,000 potholes in my hometown.
I would estimate the total number of roads in my hometown and then divide by the average length of a road segment to get an estimate of the total number of segments.
Then, I would estimate the average number of potholes per segment based on my personal experience and observations.
Finally, I would multiply the total number of segments by the average number of potholes per segment to get my estimate.
For example, if there...read more
Q124. Write code which will return Non duplicate values from array.
Code to return non-duplicate values from an array.
Create an empty array to store non-duplicate values.
Loop through the original array and check if the value already exists in the new array.
If it doesn't exist, add it to the new array.
Return the new array with non-duplicate values.
Q125. What is a stock and a bond?
A stock is a share of ownership in a company, while a bond is a debt security issued by a company or government.
Stocks represent ownership in a company and give shareholders voting rights and potential dividends.
Bonds represent a loan to a company or government and pay interest to the bondholder.
Stocks are generally considered riskier but offer higher potential returns, while bonds are considered safer but offer lower returns.
Investors often use a combination of stocks and bo...read more
Q126. What are criteria's of a workflow rule? What are process builders? What do you mean by sales process?
Criteria for workflow rules, process builders, and sales process
Workflow rule criteria include record type, evaluation criteria, and rule criteria
Process builders automate complex business processes
Sales process is a series of steps taken to convert a lead into a customer
Sales process can include lead generation, qualification, presentation, and closing
Sales process can be customized to fit the needs of a specific business
Q127. How do you setup and manager role-based permissions?
Setting up role-based permissions involves defining roles, assigning permissions to roles, and managing user access based on roles.
Define different roles based on job functions or responsibilities
Assign specific permissions to each role, determining what actions users in that role can perform
Grant or revoke access to resources based on roles
Regularly review and update roles and permissions to ensure security and compliance
Use role-based access control (RBAC) to streamline per...read more
Q128. What are joins and name one case where you applied it?
Joins are used to combine data from two or more tables based on a related column.
Joins are used in SQL to retrieve data from multiple tables.
Common types of joins include inner join, left join, right join, and full outer join.
One case where I applied joins was when I needed to retrieve customer information and their corresponding orders from two separate tables.
Another example is when I needed to combine data from a table of employees and a table of departments to determine w...read more
Q129. How to write file name into a flat file?
To write file name into a flat file, use file handling functions in programming languages.
Open the flat file in write mode
Use file handling functions to write the file name into the flat file
Close the flat file
Q130. how to generate sequence from wf to mapping
To generate sequence from wf to mapping, use a mapping transformation in the integration tool.
Create a mapping transformation in the integration tool
Add the workflow as a source in the mapping
Add the target mapping as the target in the mapping
Map the fields from the workflow to the target mapping
Execute the mapping to generate the sequence in the target mapping
Q131. How is the role of a Product Owner different from a Scrum Master?
Product Owner defines what to build, Scrum Master ensures the team builds it effectively.
Product Owner is responsible for defining and prioritizing the product backlog
Scrum Master is responsible for facilitating the Scrum process and removing impediments
Product Owner represents the stakeholders and communicates their needs to the team
Scrum Master coaches the team on Agile principles and helps them self-organize
Product Owner focuses on the 'what' and 'why' of the product
Scrum ...read more
Q132. How do you do reports, and how do you consolidate reports from different sources?
I use a standardized format for reports and consolidate data using tools like Excel or Tableau.
I use a consistent format for all reports to ensure clarity and ease of understanding.
I gather data from various sources and use tools like Excel or Tableau to consolidate it.
I ensure that all data is accurate and up-to-date before consolidating it.
I create visualizations to help convey the data in a clear and concise manner.
I collaborate with team members to ensure that all necessa...read more
Q133. 1) how to do version comparison in Smartforms.
Version comparison in Smartforms
Use the 'Version Management' option in Smartforms
Select the form and click on 'Versions' button
Compare the versions and select the desired one
Preview and save the form with the selected version
Q134. So, why did you focus on developing ppt more Visually.
Visual aids enhance audience engagement and comprehension.
Visuals help break up text-heavy slides
Images and graphics can convey complex information quickly
Animations and transitions add interest and keep audience focused
Visuals can help reinforce key points and improve retention
Effective use of color and design can enhance overall presentation
Visuals can help accommodate different learning styles
Visuals can make a presentation more memorable and impactful
Q135. You have a background with Oracle, so is there a s preference of working on oracle over SAP?
There is no preference of working on Oracle over SAP based on my background.
Both Oracle and SAP have their own strengths and weaknesses.
The choice between Oracle and SAP depends on the specific requirements of the project or organization.
Oracle is known for its robust database management system and comprehensive suite of business applications.
SAP, on the other hand, is renowned for its integrated enterprise resource planning (ERP) solutions.
It is important to evaluate factors...read more
Q136. What are the three key artefacts of scrum
The three key artefacts of Scrum are Product Backlog, Sprint Backlog, and Increment.
Product Backlog: prioritized list of features or requirements
Sprint Backlog: list of tasks to be completed during a sprint
Increment: the sum of all completed product backlog items at the end of a sprint
All three artefacts are essential for successful implementation of Scrum
Q137. Architecture and functionalities of BeyondTrust PowerBroker
BeyondTrust PowerBroker is a privileged access management solution that provides control over user access to critical systems and data.
PowerBroker allows organizations to manage and control privileged access across multiple platforms, including Windows, Unix, Linux, and Mac OS.
It provides granular access control, allowing administrators to define policies based on user roles and responsibilities.
PowerBroker also includes auditing and reporting capabilities, enabling organizat...read more
Q138. What is transfer pricing and its different methods?
Transfer pricing is the practice of determining the value of goods or services exchanged between related entities in different tax jurisdictions.
Transfer pricing is used to determine the price of goods or services transferred between related entities in different countries.
It is important for companies to ensure that transfer pricing is done at arm's length, meaning the price is similar to what would be charged between unrelated parties.
There are several methods of transfer p...read more
Q139. How would you use Data Analytics to device a solution so that school kids reach to school and back home safely and on time without the parents being worried
Utilize data analytics to ensure safe and timely transportation for school kids without parents' worry
Collect data on traffic patterns and congestion to optimize bus routes
Implement GPS tracking on buses to monitor their location in real-time
Utilize predictive analytics to anticipate potential delays and adjust schedules accordingly
Create a communication platform for parents to receive updates on their child's transportation status
Analyze historical data to identify common is...read more
Q140. Why would a company choose Agile methodology over waterfall methodology ?
Agile methodology allows for flexibility, faster delivery, and continuous improvement compared to the rigid and sequential approach of waterfall methodology.
Agile allows for continuous feedback and adaptation, while waterfall is a linear process
Agile promotes collaboration and communication between team members and stakeholders
Agile enables faster delivery of working software in smaller increments
Agile allows for changes to be made throughout the development process, while wa...read more
Q141. What are mutable and immutable data types?
Mutable data types can be changed after creation, while immutable data types cannot be changed.
Mutable data types include lists, dictionaries, and sets.
Immutable data types include strings, tuples, and frozensets.
Changing a mutable data type will modify the original object, while changing an immutable data type will create a new object.
Example: changing a list by appending an element will modify the original list, while concatenating two strings will create a new string.
Q142. Explain how you test a change management control when the application doesn't store the updates log.
Testing change management control without update log
Create a test environment to simulate the change
Document the change and expected outcome
Perform the change and observe the system behavior
Compare the system behavior with the expected outcome
Repeat the process with different scenarios
Use version control to track changes
Q143. 12) What is rest-assured? How to handle the certificate issues in rest-assured?
Rest-assured is a Java-based library used for testing RESTful APIs.
Rest-assured simplifies the testing of RESTful APIs by providing a domain-specific language (DSL) for writing tests.
To handle certificate issues in rest-assured, we can use the relaxedHTTPSValidation() method to bypass SSL certificate validation.
We can also import the certificate into the truststore and use it for SSL validation.
Q144. How Test cases are reported to stakeholders ?
Test cases are reported to stakeholders through detailed reports and presentations.
Test cases are documented and organized in a clear and concise manner.
Reports are created to summarize the test results and highlight any issues or concerns.
Presentations are given to stakeholders to provide an overview of the testing process and results.
Communication with stakeholders is ongoing throughout the testing process to ensure transparency and collaboration.
Examples of test case repor...read more
Q145. Write a function to normalise a decimal number without using math functions.
Function to normalise a decimal number without using math functions.
Extract the integer and decimal parts of the number
Count the number of digits in the decimal part
Multiply the decimal part by 10^number of decimal digits to convert it to an integer
Add the integer and converted decimal parts and return the result
Q146. Can we create composite unique keys on multiple columns in a single table
Yes, composite unique keys can be created on multiple columns in a single table.
Composite unique keys are useful for ensuring data integrity and preventing duplicates.
Syntax: CREATE TABLE table_name (column1 datatype, column2 datatype, ..., CONSTRAINT constraint_name UNIQUE (column1, column2, ...));
Example: CREATE TABLE employees (id INT, name VARCHAR(50), email VARCHAR(50), CONSTRAINT emp_unique UNIQUE (id, email));
Q147. What is the use of JVM in Java?
JVM is the virtual machine that executes Java bytecode. It provides platform independence and memory management.
JVM stands for Java Virtual Machine
It interprets compiled Java code into machine language
JVM provides platform independence by executing bytecode on any platform
It manages memory allocation and garbage collection
Examples of JVM-based languages include Kotlin and Scala
Q148. How would you select samples from 300 ledger accounts? If an account had 1000 entries worth one million dollars, how would you obtain reasonable assurance that they are correct?
To select samples from 300 ledger accounts, I would use statistical sampling techniques and stratification.
I would stratify the accounts based on their size, activity, and risk level.
I would then use statistical sampling techniques such as random sampling or systematic sampling to select a representative sample from each stratum.
For the account with 1000 entries worth one million dollars, I would use monetary unit sampling to select a sample of entries based on their dollar v...read more
Q149. How would arrive at a conclusion to a complex question?
I would gather relevant information, analyze data, consult with experts, consider different perspectives, and use critical thinking to arrive at a conclusion.
Gather all relevant information related to the complex question
Analyze data and statistics to identify patterns and trends
Consult with subject matter experts to gain insights and perspectives
Consider different viewpoints and arguments before forming a conclusion
Utilize critical thinking skills to evaluate the information...read more
Q150. What are the basic differences between the different types of SQL joins?
SQL joins are used to combine rows from two or more tables based on a related column between them.
INNER JOIN: Returns records that have matching values in both tables.
LEFT JOIN: Returns all records from the left table and the matched records from the right table.
RIGHT JOIN: Returns all records from the right table and the matched records from the left table.
FULL JOIN: Returns all records when there is a match in either left or right table.
CROSS JOIN: Returns the Cartesian pro...read more
Q151. Explain Inheritance and how you have implemented inheritance in your work?
Inheritance is a concept in object-oriented programming where a class inherits properties and behaviors from another class.
Inheritance allows for code reuse and promotes modularity.
The class that is being inherited from is called the superclass or base class.
The class that inherits from the superclass is called the subclass or derived class.
The subclass inherits all the public and protected members of the superclass.
Inheritance is implemented using the 'extends' keyword in la...read more
Q152. Example, when your are script writer. How do you establish connection to DB?
Establishing connection to a DB as a script writer.
Choose a suitable programming language for the task
Install the necessary database driver
Provide the correct credentials for the database
Test the connection before proceeding with the script
Q153. How would you integrate Primavera with SAP?
Integrating Primavera with SAP involves establishing a data exchange between the two systems to ensure seamless project management and financial integration.
Identify the data to be exchanged between Primavera and SAP
Map the data fields and establish a data mapping strategy
Implement an integration solution using middleware or custom development
Test and validate the integration to ensure data accuracy and consistency
Establish a monitoring and maintenance plan for ongoing integr...read more
Q154. Knowledge Management is a growing field. You are a smaller company going up against a more established one. What would you do?
Establish a niche and focus on personalized service to differentiate from the larger company.
Identify a specific area of knowledge management where the larger company may not be as strong
Offer personalized service and tailored solutions to clients
Leverage technology to streamline processes and improve efficiency
Build a strong online presence through social media and content marketing
Partner with other smaller companies to offer a wider range of services
Q155. what are access specifiers in c++
Access specifiers in C++ are keywords that determine the visibility and accessibility of class members.
There are three access specifiers in C++: public, private, and protected.
Public members are accessible from anywhere in the program.
Private members are only accessible within the class itself.
Protected members are accessible within the class and its derived classes.
Access specifiers are used to enforce encapsulation and control the access to class members.
Q156. Informatica lookup transformation, difference between static and dynamic lookup.
Static and dynamic lookup in Informatica
Static lookup caches the lookup table data at the beginning of the session while dynamic lookup caches data as required during the session
Static lookup is faster but consumes more memory while dynamic lookup is slower but consumes less memory
Static lookup is used when the lookup table is small and doesn't change frequently while dynamic lookup is used when the lookup table is large or changes frequently
Q157. 9) When an Asset increases it must be debited or credited?
When an asset increases, it must be debited.
Debit increases assets and credit decreases assets.
Assets include cash, accounts receivable, inventory, property, and equipment.
For example, if a company purchases a new machine, the asset account for machinery will be debited to increase it.
This is based on the accounting equation: Assets = Liabilities + Equity.
Q158. How do you connect multi VPC without the use of a transit gateway?
Multi VPCs can be connected using VPC peering or VPN connections.
VPC peering allows direct communication between VPCs using private IP addresses.
VPN connections can be established between VPCs using virtual private gateways.
Routing tables need to be updated to allow traffic flow between VPCs.
Security groups and network ACLs need to be configured to allow traffic between VPCs.
AWS Transit Gateway can also be used to connect multiple VPCs.
VPC peering and VPN connections have lim...read more
Q159. How you load 1 million record without any external tool
Use batch processing and optimized SQL queries to load 1 million records without external tools.
Utilize batch processing to insert records in chunks rather than individually
Optimize SQL queries for efficient data loading
Consider using stored procedures for faster data insertion
Q160. What is raml? difference between fragments and traits
RAML is a RESTful API Modeling Language used to describe APIs. Fragments are reusable parts of RAML files, while traits are reusable sets of properties and methods.
RAML is a language for describing APIs in a structured way
Fragments in RAML are reusable parts of RAML files that can be included in multiple API definitions
Traits in RAML are reusable sets of properties and methods that can be applied to multiple resources or methods
Fragments and traits help in reducing duplicatio...read more
Q161. Is Javascript a single/multi threaded language? If single threaded then how does backend calls work?
Javascript is a single-threaded language, but it can handle asynchronous operations through callbacks and promises.
Javascript is single-threaded, meaning it can only execute one task at a time.
However, it can handle asynchronous operations by using callbacks, promises, and async/await.
Backend calls in Javascript are typically made using asynchronous functions, allowing the program to continue executing other tasks while waiting for the response.
For example, when making an HTT...read more
Q162. What is DLP? Explain its working.
DLP stands for Data Loss Prevention. It is a security solution that helps prevent sensitive data from being leaked or lost.
DLP works by identifying and classifying sensitive data, such as credit card numbers or social security numbers.
It then monitors the flow of this data, both within the organization and outside of it.
If it detects any unauthorized attempts to access or transmit this data, it can take action to prevent it.
Examples of DLP solutions include endpoint protectio...read more
Q163. State all the differences which are possible and also the application of both the relationships.
There are different types of relationships possible with varying degrees of commitment and intimacy. Each has its own application.
Types of relationships: casual, romantic, platonic, familial, professional
Casual relationships are low-commitment and often short-term
Romantic relationships involve emotional and physical intimacy
Platonic relationships are non-romantic and non-sexual
Familial relationships are based on blood or legal ties
Professional relationships are based on work ...read more
Q164. Guesstimate the market size of my client based on the information I knew.
Market size guesstimate for client
Need more information on client's industry and target market
Assuming client operates in the US, estimate total addressable market (TAM) for their product/service
Calculate client's market share based on revenue or customer base
Consider potential growth opportunities and market trends
Final estimate should be based on a range of scenarios
Q165. how will you handle a situation when client is unhappy with ur product
I would address the client's concerns promptly and work towards finding a solution to meet their needs.
Listen to the client's feedback and understand their specific concerns
Apologize for any inconvenience caused and assure them that their feedback is valued
Offer potential solutions or alternatives to address their dissatisfaction
Follow up with the client to ensure that the issue has been resolved to their satisfaction
Q166. What are 5 heads of income? What is depreciation and types? What is accrued interest?
The 5 heads of income are salary, house property, business/profession, capital gains, and other sources.
Salary income includes income from employment
House property income includes rental income
Business/profession income includes income from self-employment
Capital gains income includes profits from sale of assets
Other sources income includes income from sources not covered under the other heads
Depreciation is the decrease in value of an asset over time
Types of depreciation inc...read more
Q167. Movement types and transaction event keys in Subcontracting process?
In subcontracting process, movement types and transaction event keys are used to track the movement of materials between the subcontractor and the company.
Movement type 541 is used to transfer raw materials to the subcontractor
Movement type 542 is used to receive the finished goods from the subcontractor
Transaction event key WE is used for goods issue to the subcontractor
Transaction event key WA is used for goods receipt from the subcontractor
Q168. what is the difference between designing a website and a mobile application?
Designing a website and a mobile application differ in terms of screen size, user behavior, and functionality.
Screen size: Mobile screens are smaller, so the design should be optimized for smaller screens.
User behavior: Mobile users tend to interact differently than website users, so the design should be tailored to their behavior.
Functionality: Mobile apps can take advantage of device features like GPS and camera, while websites cannot.
Examples: A website may have a navigati...read more
Q169. How to install SCCM Client if the machine is not in VPN and Organization network?
SCCM client can be installed using internet-based client management or cloud management gateway.
Use internet-based client management to install SCCM client over the internet.
Configure cloud management gateway to install SCCM client from the cloud.
Ensure that the client has internet connectivity and proper authentication credentials.
Use client push installation method or manual installation method.
In manual installation method, download the client installation package and run ...read more
Q170. How do you print multiple logo from a single template
To print multiple logos from a single template, use a batch processing tool or create a script to automate the process.
Use a batch processing tool like Adobe Photoshop's Batch Processing feature to apply the template to multiple logos at once.
Create a script using a programming language like Python to automate the process of applying the template to multiple logos.
Ensure that the logos are in a compatible file format for the template.
Adjust the template as necessary to fit ea...read more
Q171. Tell me the five criterias to recognise revenue as per Ind As 115
The five criteria to recognize revenue as per Ind AS 115 are identification of contract, identification of performance obligations, determination of transaction price, allocation of transaction price, and recognition of revenue when performance obligations are satisfied.
Identification of contract
Identification of performance obligations
Determination of transaction price
Allocation of transaction price
Recognition of revenue when performance obligations are satisfied
Q172. What are business rules constructed using?
Business rules are constructed using logic and conditions.
Logic
Conditions
Constraints
Decision tables
Rule engines
Q173. Explain Compile time and Run time polymorphism with Example
Compile time polymorphism is achieved through function overloading and operator overloading, while run time polymorphism is achieved through virtual functions and inheritance.
Compile time polymorphism is resolved during compile time based on the number and types of arguments passed to a function. Example: function overloading.
Run time polymorphism is resolved during runtime based on the actual object type. Example: virtual functions in inheritance.
Compile time polymorphism is...read more
Q174. Which all technology you have came across?
I have experience with a wide range of technologies including Java, Python, SQL, AWS, Docker, and Kubernetes.
Java
Python
SQL
AWS
Docker
Kubernetes
Q175. What are the roles associated with Scrum ?
Scrum roles include Product Owner, Scrum Master, and Development Team.
Product Owner is responsible for defining and prioritizing the product backlog.
Scrum Master facilitates the Scrum process and ensures adherence to Scrum principles.
Development Team is responsible for delivering a potentially releasable product increment at the end of each sprint.
Q176. On resume- difference between html5 and its previous version?
HTML5 is the latest version of HTML with new features and improvements.
HTML5 has new semantic tags like
, HTML5 supports audio and video elements without the need for plugins.
HTML5 has improved form elements like date pickers, range sliders, etc.
HTML5 has improved canvas and SVG support for graphics.
HTML5 has improved accessibility features.
HTML5 has improved support for mobile devices.
Previous versions of HTML did not have these features.
Q177. Guestimate: Estimate the number of MRI scanners in India.
Estimating the number of MRI scanners in India.
Research the population of India and the number of MRI scanners per capita in other countries.
Consider the number of hospitals and medical facilities in India.
Take into account the healthcare infrastructure and accessibility in different regions of India.
Consult industry reports and statistics on the healthcare sector in India.
Consider the growth rate of MRI scanner installations in recent years.
Q178. Describe your journey from Data Science to Consulting.
Transitioned from Data Science to Consulting by leveraging analytical skills and business acumen.
Developed expertise in data analysis and modeling through academic and professional experience.
Recognized the importance of understanding business objectives and translating data insights into actionable recommendations.
Built strong communication and presentation skills to effectively convey complex information to clients.
Collaborated with cross-functional teams to deliver solutio...read more
Q179. Design a ticket booking system on the lines of book my show.
A ticket booking system similar to BookMyShow
User registration and login
Event listing and selection
Seat selection and payment
Confirmation and ticket generation
Integration with payment gateways
Admin panel for event and user management
Q180. CASE STUDIE:- CALCULATE REVENUE OF ICE CREAM PARLOUR
To calculate revenue of an ice cream parlor, we need to consider factors like sales volume, pricing strategy, and operational costs.
Determine the average number of customers per day and the average amount spent per customer
Consider the cost of ingredients, labor, rent, and utilities
Analyze the competition and adjust pricing strategy accordingly
Explore opportunities for upselling and cross-selling
Track sales and expenses regularly to identify trends and make informed decisions
Q181. What are webhooks in shopify?
Webhooks in Shopify are notifications sent to a URL when certain events occur in a store.
Webhooks allow apps to receive real-time data about events in a Shopify store
Developers can use webhooks to automate tasks or trigger actions based on specific events
Examples of events that can trigger webhooks include order creation, product updates, and customer registration
Q182. How do you do ageing analysis/how do you prepare bills payables
Ageing analysis is done by categorizing bills payables by their due dates and calculating the number of days past due.
Sort bills payables by due date
Categorize bills payables by age (e.g. 0-30 days past due, 31-60 days past due, etc.)
Calculate the total amount of bills payables in each age category
Analyze the trend of bills payables aging over time
Prepare a report to show the ageing analysis results
Q183. What is acceptance testing and who do beta testing ?
Acceptance testing is a type of testing to ensure that the software meets the customer's requirements. Beta testing is done by end-users.
Acceptance testing is done to ensure that the software meets the customer's requirements
It is usually done by the customer or a representative of the customer
Beta testing is done by end-users to identify any issues before the software is released to the public
Beta testing is usually done in a real-world environment
Both acceptance testing and...read more
Q184. Write some LINQ statements which are used for String and DataTable manipulations
LINQ statements for String and DataTable manipulations
For String manipulations, use methods like Where, Select, OrderBy, GroupBy, etc.
For DataTable manipulations, use methods like Where, Select, OrderBy, GroupBy, Join, etc.
Use lambda expressions to specify the conditions for filtering, sorting, grouping, etc.
Example: var result = myStringArray.Where(s => s.Length > 5).OrderBy(s => s);
Example: var result = myDataTable.Where(row => row.Field
("Age") > 18).Select(row => row.Field...read more
Q185. What is the difference between the Master-Detail and Lookup relationship?
Master-Detail is a parent-child relationship where the child record cannot exist without the parent. Lookup is a simple reference relationship.
Master-Detail relationship is a stricter form of relationship where the child record inherits the security and sharing settings of the parent record.
In a Master-Detail relationship, deleting the parent record will delete all the child records associated with it.
Lookup relationship is a simpler form of relationship where the child recor...read more
Q186. Would you work differently with competitors data as opposed to own data?
Yes, competitor data requires additional scrutiny and validation before use.
Competitor data may not be as reliable as own data
Competitor data may have different methodologies or definitions
Competitor data may require additional validation and verification
Competitor data may require additional legal considerations
Own data may be more readily available and easier to use
Q187. 10) When equity decreases it must be debited or credited?
Equity decreases must be debited.
Equity is a credit balance account, so when it decreases, it must be debited to reduce the credit balance.
Debiting equity reduces the owner's or shareholder's equity in the business.
Examples of equity decreasing transactions include paying dividends, recording losses, or issuing treasury stock.
Q188. An auto after sales company is not doing well. It has been found that their supply chain solution might not be very effective. They are considering 2 more options in redesigning their supply chain. Should they ...
read moreYes, they should change their supply chain solution.
The current supply chain solution is not effective, which is impacting the company's performance.
Changing the supply chain can lead to improved efficiency, cost reduction, and customer satisfaction.
Consider the potential benefits and drawbacks of each option before making a decision.
Examples of options could include implementing a new inventory management system or outsourcing logistics operations.
Q189. What is the ticketing tool used in your project
The ticketing tool used in our project is JIRA.
JIRA is a popular project management tool used for issue tracking and agile project management.
It allows for creating, tracking, and managing tasks and issues throughout the project lifecycle.
Users can prioritize, assign, and track progress of tasks using JIRA.
JIRA also offers customizable workflows and reporting features for better project management.
Example: We use JIRA to create and track user stories, bugs, and tasks in our s...read more
Q190. New technology in the field of semiconductor industry?
The semiconductor industry is constantly evolving with new technologies such as AI, IoT, and 5G driving innovation.
AI is being used to improve chip design and manufacturing processes
IoT is driving demand for low-power and high-performance chips
5G is increasing demand for high-speed and low-latency chips
Emerging technologies such as quantum computing and neuromorphic computing are being explored for future applications
Q191. Coding problem like swapping two variables without a third one
Swapping two variables without a third one using XOR operation
Use XOR operation to swap two variables without a third one
Example: a = 5, b = 10. a ^= b; b ^= a; a ^= b; // Now a = 10, b = 5
Q192. Write a program to sort an array, half in ascending and half in descending
Program to sort an array, half ascending and half descending
Split the array into two halves
Sort the first half in ascending order and the second half in descending order
Merge the two sorted halves back together
Q193. What is EDR? Explain its working.
EDR stands for Endpoint Detection and Response. It is a cybersecurity technology that detects and responds to threats on endpoints.
EDR monitors endpoint activity for suspicious behavior
It uses machine learning and behavioral analysis to identify threats
EDR can isolate infected endpoints and contain the threat
Examples of EDR solutions include CrowdStrike, Carbon Black, and SentinelOne
Q194. Come up with a scenario and how will you design an elearning material.
Designing an elearning material for customer service representatives on handling difficult customers.
Identify common difficult customer scenarios
Provide strategies for de-escalating situations
Include interactive scenarios for practice
Incorporate real-life examples and case studies
Include assessments to measure understanding
Use engaging multimedia elements
Ensure accessibility for all learners
Q195. How do you manage application state?
Application state is managed through various techniques such as Redux, Context API, and local state.
Redux is a popular state management library that allows for a centralized store of application state.
Context API is a built-in React feature that allows for sharing state between components without the need for props drilling.
Local state can be used for managing state within a single component.
Other techniques include using third-party libraries like MobX or implementing the Fl...read more
Q196. What do u mean by DNS?
DNS stands for Domain Name System, which is a system that translates domain names into IP addresses.
DNS is used to locate websites and other resources on the internet.
It works by translating human-readable domain names into machine-readable IP addresses.
DNS servers store information about domain names and their corresponding IP addresses.
Examples of DNS servers include Google DNS, OpenDNS, and Cloudflare DNS.
Q197. What do you think telecom operators should do to prevent this problem?
Telecom operators should invest in robust network infrastructure and implement strict security measures to prevent problems.
Invest in upgrading network infrastructure to handle increasing data traffic
Implement strong security measures to protect against cyber threats
Regularly monitor and analyze network performance to identify and address potential issues
Provide reliable customer support to promptly address customer complaints and concerns
Offer competitive pricing and attract...read more
Q198. what is a Kernel in OS
Kernel is the core component of an operating system that manages system resources and provides a bridge between hardware and software.
Kernel is responsible for managing memory, processes, and device drivers.
It provides an interface for applications to access hardware resources.
Kernel operates in privileged mode and has direct access to the hardware.
Examples of popular kernels are Linux kernel, Windows NT kernel, and macOS kernel.
Q199. Explain your projects !! Which Programming languages do u know ? Write a program of your choice in your preferred programming language !! What are your long term goals ? What are your preferred technologies ?
I have worked on multiple projects using various programming languages. My long term goal is to become a data analyst and my preferred technologies are Python and SQL.
Projects: E-commerce website using PHP, Inventory management system using Java, Data analysis of customer behavior using Python
Programming languages: Python, Java, PHP, SQL
Program: Python program to calculate the factorial of a number
Long term goal: To become a data analyst
Preferred technologies: Python and SQL
Q200. How is EPM different from EEPM?
EPM stands for Enterprise Performance Management, while EEPM stands for Extended Enterprise Performance Management.
EPM focuses on managing and improving the performance of an entire organization.
EEPM extends the scope of EPM to include external stakeholders such as suppliers, partners, and customers.
EPM typically involves financial planning, budgeting, forecasting, and reporting.
EEPM goes beyond financial aspects and includes collaboration, data sharing, and performance monit...read more
More about working at Deloitte
Top HR Questions asked in Invictus Digisoft
Interview Process at Invictus Digisoft
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month