Add office photos
Engaged Employer

Ernst & Young

3.4
based on 10.8k Reviews
Video summary
Filter interviews by

70+ Pfizer Interview Questions and Answers

Updated 25 Nov 2024
Popular Designations

Q1. list tuple difference Dictionary and list comprehension Decorators with example Sequencial non sequencial data types Pandas Create dataframe from dictionary Fillna, Merge Difference between joins append insert...

read more
Ans.

Interview questions on Python programming concepts and tools.

  • List and tuple are both sequence data types, but tuples are immutable.

  • List comprehension is a concise way to create lists based on existing lists.

  • Decorators are functions that modify the behavior of other functions.

  • Sequential data types are accessed in a specific order, while non-sequential data types are not.

  • Pandas is a Python library for data manipulation and analysis.

  • DataFrames can be created from dictionaries us...read more

View 1 answer

Q2. Expalin what is supply chain management?

Ans.

Supply chain management is the coordination and management of activities involved in the production and delivery of products and services.

  • It involves the planning, sourcing, manufacturing, and delivery of products or services

  • It aims to optimize the flow of goods and services from the supplier to the customer

  • It involves managing relationships with suppliers and customers

  • It helps to reduce costs, improve efficiency, and increase customer satisfaction

  • Examples include inventory m...read more

View 1 answer

Q3. What are the top risks faced by an IT company at enterprise level?

Ans.

Top risks faced by IT companies at enterprise level

  • Cybersecurity threats and data breaches

  • Lack of skilled workforce and talent retention

  • Dependency on third-party vendors and service providers

  • Compliance and regulatory issues

  • Technological obsolescence and disruption

  • Financial instability and market volatility

Add your answer

Q4. Power BI round: how to design dashboard? dax query, how to do schedule refresh?

Ans.

Designing a Power BI dashboard involves creating a visually appealing layout, writing DAX queries to retrieve data, and scheduling refreshes.

  • Identify the key metrics and KPIs to display on the dashboard

  • Choose appropriate visualizations to represent the data

  • Write DAX queries to retrieve and manipulate data

  • Create calculated columns and measures to perform calculations

  • Set up data refresh schedules to ensure the dashboard is up-to-date

  • Consider user experience and design a user-fr...read more

Add your answer
Discover Pfizer interview dos and don'ts from real experiences

Q5. What is the difference between single linked list, double linked list and circular linked list?

Ans.

Single linked list has one link per node, double linked list has two links per node, and circular linked list connects the last node to the first node.

  • Single linked list: Each node has a reference to the next node only.

  • Double linked list: Each node has references to both the next and previous nodes.

  • Circular linked list: Last node's reference points back to the first node, forming a circle.

Add your answer

Q6. How would you explain analytics to your grandfather

Ans.

Analytics is using data to find patterns and insights that help make better decisions.

  • Analytics is like solving a puzzle with data

  • It helps us understand what happened, why it happened, and what might happen in the future

  • For example, it can help a business figure out which products are selling well and why

  • Or it can help a doctor predict which patients are at risk for certain diseases

  • It's like having a crystal ball that helps us make smarter choices

Add your answer
Are these interview questions helpful?

Q7. For unconnected lookup how can we obtain more than 1 return value

Ans.

Use a connected lookup to obtain more than 1 return value in an unconnected lookup

  • Use a connected lookup transformation to retrieve multiple values based on a common key

  • Join the output of the connected lookup with the main pipeline using a joiner transformation

  • Configure the connected lookup to return multiple rows for a single input key

Add your answer

Q8. What are the stages involved in the Loan Lifecycle?

Ans.

The stages involved in the Loan Lifecycle include application, underwriting, approval, funding, and repayment.

  • Application: Borrower submits loan application with necessary documents.

  • Underwriting: Lender evaluates borrower's creditworthiness and risk.

  • Approval: Lender approves the loan based on underwriting results.

  • Funding: Loan amount is disbursed to the borrower.

  • Repayment: Borrower makes regular payments to repay the loan.

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. How do you go about performing audit of procurement function?

Ans.

Audit of procurement function involves reviewing procurement policies, procedures, contracts, and vendor management.

  • Review procurement policies and procedures to ensure compliance with regulations and best practices

  • Examine contracts to ensure they are properly executed and contain necessary provisions

  • Evaluate vendor management practices to ensure proper due diligence and risk management

  • Assess procurement performance metrics to identify areas for improvement

  • Conduct interviews ...read more

Add your answer

Q10. FAR check if each one FA is located severly (proced"s involved)

Ans.

To check if each FA is located severely, follow the FAR procedures.

  • Refer to FAR Part 45 for definitions and identification of FAs

  • Check the records of each FA to determine its location

  • Ensure that the location of each FA is compliant with applicable regulations

  • If any FA is found to be located severely, take appropriate corrective action

Add your answer

Q11. How to make live Dashboards with Power BI

Ans.

Live dashboards can be created in Power BI by connecting to real-time data sources and using features like streaming datasets and push datasets.

  • Connect to real-time data sources such as Azure Stream Analytics, Azure Event Hubs, or Power Automate

  • Create streaming datasets to continuously update data in real-time

  • Use push datasets to push data from external sources to Power BI

  • Design visualizations and add them to a dashboard

  • Set up automatic data refresh intervals for real-time up...read more

View 1 answer

Q12. what are the automations you have done in financial reporting project

Ans.

Implemented automations in financial reporting project to streamline processes and improve accuracy.

  • Developed automated templates for financial statements

  • Utilized software to automatically generate reports based on predefined criteria

  • Implemented data integration tools to streamline data collection and analysis

  • Set up automated alerts for discrepancies or anomalies in financial data

Add your answer

Q13. Deduplicate table with duplicate rows using window functions

Ans.

Use window functions to deduplicate table with duplicate rows

  • Use the ROW_NUMBER() window function to assign a unique row number to each row

  • Partition by the columns that you want to deduplicate on

  • Filter out rows where the row number is greater than 1 to keep only unique rows

Add your answer

Q14. Why is Binomial Model used to price American options?

Ans.

The Binomial Model is used to price American options due to its ability to account for early exercise opportunities and flexibility in modeling various scenarios.

  • Binomial Model allows for the consideration of early exercise opportunities, which is a key feature of American options.

  • It is flexible in modeling different scenarios and can handle complex option structures.

  • The model is relatively easy to understand and implement compared to other pricing models like Black-Scholes.

  • I...read more

Add your answer

Q15. How do hospitals should open up business post covid

Ans.

Hospitals should open up business post covid by implementing strict safety measures, increasing telemedicine services, and prioritizing high-risk patients.

  • Implement strict safety measures such as mandatory mask-wearing, temperature checks, and frequent sanitization

  • Increase telemedicine services to reduce in-person visits and limit exposure

  • Prioritize high-risk patients for appointments and procedures to ensure their safety

  • Gradually resume elective surgeries and procedures whil...read more

Add your answer

Q16. How would you digitise NBFC loan disbursement

Ans.

Digitising NBFC loan disbursement involves implementing a digital platform for loan application, approval, and disbursement.

  • Develop a user-friendly digital platform for loan application and approval

  • Integrate the platform with credit bureaus for credit checks and risk assessment

  • Implement e-signature and e-KYC for paperless verification

  • Use APIs to connect with banks for fund transfer

  • Ensure data security and compliance with regulations

  • Provide customer support through chatbots an...read more

Add your answer

Q17. How do you prioritise risks during risk assessment?

Ans.

Prioritising risks during risk assessment involves evaluating the likelihood and impact of each risk to determine which ones require immediate attention.

  • Assess the likelihood of each risk occurring

  • Evaluate the potential impact of each risk on the project or organization

  • Consider the interconnectedness of risks and how they may compound each other

  • Prioritize risks based on the combination of likelihood and impact

  • Focus on addressing high priority risks first to mitigate potential...read more

Add your answer

Q18. How to create a mortgage schedule using the excel?

Ans.

To create a mortgage schedule using Excel, you can use the PMT function and create a table with columns for payment number, payment amount, principal, interest, and remaining balance.

  • Use the PMT function to calculate the monthly mortgage payment based on the loan amount, interest rate, and loan term.

  • Create a table with columns for payment number, payment amount, principal, interest, and remaining balance.

  • Use formulas to calculate the principal and interest portions of each pa...read more

Add your answer

Q19. Value of tangible asset as per accounting standard

Ans.

Tangible assets are physical assets that have a measurable value and are used in business operations.

  • Tangible assets are recorded on the balance sheet at their original cost minus any accumulated depreciation.

  • Examples of tangible assets include buildings, equipment, vehicles, and land.

  • The value of tangible assets can be affected by factors such as market demand, technological advancements, and wear and tear.

  • Tangible assets are important for businesses as they can be used as c...read more

Add your answer

Q20. Realizing the maximum solar power potential in Nepal

Ans.

Nepal can realize its maximum solar power potential by implementing policies to encourage solar energy adoption and investing in infrastructure.

  • Implement policies to incentivize solar energy adoption

  • Invest in infrastructure for solar power generation and distribution

  • Encourage public-private partnerships to fund solar projects

  • Promote awareness and education about the benefits of solar energy

  • Explore innovative financing options such as crowdfunding and microfinance

  • Leverage inte...read more

Add your answer

Q21. Decision tree,Random forest.How the algorithm works.R square, adjusted r square

Ans.

Decision tree and random forest are machine learning algorithms used for classification and regression tasks. R square and adjusted r square are evaluation metrics for regression models.

  • Decision tree is a tree-like model where each node represents a feature and each branch represents a decision rule. Random forest is an ensemble of decision trees.

  • Decision tree and random forest are used for both classification and regression tasks.

  • R square is a metric that measures the propor...read more

Add your answer

Q22. Devise entry strategy for a conveyer belts manufacturer

Ans.

Analyze market, identify potential customers, establish partnerships with distributors, and offer customized solutions.

  • Conduct market research to identify potential customers and competitors

  • Establish partnerships with distributors to expand reach

  • Offer customized solutions to meet specific customer needs

  • Invest in marketing and advertising to increase brand awareness

  • Provide excellent customer service to build a loyal customer base

Add your answer

Q23. one case on how to protect market share

Ans.

To protect market share, a company can focus on innovation, customer loyalty, and competitive pricing.

  • Invest in research and development to create new and improved products

  • Offer loyalty programs and incentives to retain customers

  • Monitor competitors' pricing and adjust prices accordingly

  • Improve customer service to increase satisfaction and loyalty

  • Expand into new markets or segments to increase market share

  • Partner with other companies to offer complementary products or services...read more

Add your answer

Q24. Difference between where and having

Ans.

WHERE is used to filter rows before grouping, HAVING is used to filter groups after grouping.

  • WHERE is used with SELECT, UPDATE, DELETE statements to filter rows based on a condition

  • HAVING is used with GROUP BY clause to filter groups based on a condition

  • WHERE is applied before data is grouped, HAVING is applied after data is grouped

  • Example: SELECT * FROM table WHERE column = value;

  • Example: SELECT column, COUNT(*) FROM table GROUP BY column HAVING COUNT(*) > 1;

Add your answer

Q25. Order of execution of SQL statements in a query

Ans.

SQL statements in a query are executed in a specific order to ensure accurate results.

  • SQL statements are executed in the following order: FROM, WHERE, GROUP BY, HAVING, SELECT, ORDER BY.

  • The FROM clause retrieves data from tables, WHERE filters the data, GROUP BY groups the data, HAVING filters groups, SELECT retrieves specific columns, and ORDER BY sorts the results.

  • For example, in the query SELECT * FROM employees WHERE department = 'IT' ORDER BY last_name;, the order of exe...read more

Add your answer

Q26. What do you understand by Duration of a bond?

Ans.

Duration of a bond is a measure of its sensitivity to interest rate changes.

  • Duration measures the weighted average time it takes for a bond's cash flows to repay its price.

  • It helps investors understand how much the bond's price will change in response to interest rate movements.

  • Longer duration bonds are more sensitive to interest rate changes than shorter duration bonds.

  • Duration is expressed in years and can be used to compare bonds with different maturities and coupon rates.

Add your answer

Q27. What is breakeven point?

Ans.

Breakeven point is the level of sales at which total costs equal total revenue.

  • It is the point where a company neither makes a profit nor incurs a loss.

  • It is calculated by dividing fixed costs by the contribution margin per unit.

  • It helps in determining the minimum sales required to cover all costs.

  • It is an important tool for businesses to make informed decisions about pricing and production.

  • For example, if a company has fixed costs of $10,000 and a contribution margin per uni...read more

Add your answer

Q28. How to automate and integrate API

Ans.

Automating and integrating APIs involves using tools and techniques to streamline the process of connecting and interacting with different software systems.

  • Use API testing tools like Postman or SoapUI to automate API calls and verify responses

  • Implement API integration frameworks like Apache Camel or MuleSoft to facilitate seamless communication between systems

  • Leverage scripting languages like Python or JavaScript to write scripts that automate API interactions

  • Utilize API mana...read more

View 1 answer

Q29. Give an example of money laundering

Ans.

Money laundering is the process of making illegally obtained money appear legal.

  • Money is moved through a series of transactions to conceal its origin

  • The money is often invested in legitimate businesses or assets

  • The launderer may use shell companies or offshore accounts to hide the money

  • Examples include drug trafficking, embezzlement, and tax evasion

  • Money laundering is a serious crime with severe penalties

Add your answer

Q30. How do you manage risks in daily life?

Ans.

I manage risks in daily life by identifying potential risks, assessing their impact, and taking proactive measures to mitigate them.

  • Identifying potential risks by analyzing the situation and considering all possible outcomes

  • Assessing the impact of each risk on my daily life and prioritizing them based on severity

  • Taking proactive measures to mitigate risks, such as creating contingency plans or seeking advice from experts

  • Regularly reviewing and updating my risk management stra...read more

Add your answer

Q31. how do you manage many tasks at once?

Ans.

I prioritize tasks based on deadlines and importance, use to-do lists and calendars, delegate when possible, and stay organized.

  • Prioritize tasks based on deadlines and importance

  • Use to-do lists and calendars to stay organized

  • Delegate tasks when possible to lighten the workload

  • Stay focused on one task at a time to avoid feeling overwhelmed

Add your answer

Q32. Difference between Statutory and Internal Audit

Ans.

Statutory audit is mandatory by law while internal audit is voluntary and conducted by the company itself.

  • Statutory audit is conducted to ensure compliance with legal requirements and financial reporting standards.

  • Internal audit is conducted to evaluate the effectiveness of internal controls and identify areas for improvement.

  • Statutory audit is conducted by an external auditor while internal audit is conducted by the company's own employees.

  • Examples of statutory audit include...read more

Add your answer

Q33. Find the count of distinct items in a list

Ans.

To find the count of distinct items in a list, use a set to remove duplicates and count the remaining items.

  • Create a set from the list to remove duplicates

  • Count the remaining items in the set

  • Return the count as the result

Add your answer

Q34. Have you worked on IOT devices?

Ans.

Yes, I have worked on IOT devices in previous projects.

  • Developed software for IOT devices to collect and analyze data

  • Implemented security measures to protect IOT devices from cyber attacks

  • Integrated IOT devices with cloud platforms for remote monitoring and control

Add your answer

Q35. What do you mean by array?

Ans.

An array is a data structure that stores a collection of elements, typically of the same type, in a contiguous block of memory.

  • Arrays have a fixed size determined at the time of declaration.

  • Elements in an array are accessed by their index, starting from 0.

  • Example: ['apple', 'banana', 'orange'] is an array of strings.

Add your answer

Q36. What do you mean by string?

Ans.

A string is a sequence of characters used to represent text.

  • A string is typically enclosed in quotation marks, such as 'hello world'.

  • Strings can contain letters, numbers, symbols, and spaces.

  • Strings can be manipulated using various string functions like concatenation and substring.

  • Examples of strings include 'apple', '12345', and 'Hello, World!'

Add your answer

Q37. Find the non longest non repeating substring.

Ans.

To find the non longest non repeating substring, we need to iterate through the string and keep track of the substrings that do not contain repeating characters.

  • Iterate through the string and keep track of the substrings that do not contain repeating characters

  • Use a hash set to keep track of the characters in the substring

  • If a repeating character is found, update the starting index of the substring to the next character after the first occurrence of the repeating character

  • Rep...read more

Add your answer

Q38. What do you know about transfer pricing

Ans.

Transfer pricing refers to the setting of prices for goods and services sold between related entities within an enterprise.

  • Transfer pricing is used by multinational companies to allocate profits and costs between different divisions or subsidiaries.

  • It is important for tax purposes to ensure that transfer prices are set at arm's length, meaning they are similar to what unrelated parties would agree upon.

  • Transfer pricing can involve tangible goods, intangible assets, services, ...read more

Add your answer

Q39. what do you understand by derivatives

Ans.

Derivatives are financial instruments whose value is derived from an underlying asset or group of assets.

  • Derivatives can be used for hedging, speculation, or arbitrage.

  • Common types of derivatives include options, futures, forwards, and swaps.

  • Derivatives allow investors to take positions on the future price movements of assets without actually owning the assets.

  • They can be used to manage risk by offsetting potential losses in one investment with gains in another.

  • Derivatives ar...read more

Add your answer

Q40. Explain GRc and how can SAP help there

Ans.

GRC stands for Governance, Risk, and Compliance. SAP offers solutions to help organizations manage and mitigate risks.

  • GRC involves managing policies, procedures, and regulations to ensure compliance

  • SAP GRC solutions help automate risk management processes and monitor compliance

  • Examples of SAP GRC modules include Access Control, Process Control, and Risk Management

  • SAP GRC can help organizations streamline their governance processes and reduce compliance risks

Add your answer

Q41. Convert the table rows into columns

Ans.

To convert table rows into columns, transpose the data by switching rows and columns.

  • Identify the unique values in the original table that will become the new columns

  • Create a new table with these unique values as columns and fill in the corresponding data from the original table

  • Transpose the data by switching rows and columns

View 1 answer

Q42. What do you know about Audit?

Ans.

Audit is a systematic examination of financial records, statements, or operations to ensure accuracy and compliance with laws and regulations.

  • Audit involves reviewing financial records, statements, and operations of a company or organization.

  • The purpose of an audit is to ensure accuracy, reliability, and compliance with laws and regulations.

  • Auditors may also provide recommendations for improving financial processes and internal controls.

  • Types of audits include financial audit...read more

Add your answer

Q43. Data Cleaning Techniques mentioned in project

Ans.

Data cleaning techniques include removing duplicates, handling missing values, standardizing data formats, and correcting errors.

  • Removing duplicates by identifying and deleting identical records

  • Handling missing values by imputing with mean, median, or mode

  • Standardizing data formats by converting text to lowercase, removing special characters, and formatting dates

  • Correcting errors by using data validation rules and outlier detection techniques

Add your answer

Q44. Calculate the growth rate?

Ans.

To calculate growth rate, divide the difference between final and initial value by initial value and multiply by 100.

  • Subtract the initial value from the final value

  • Divide the result by the initial value

  • Multiply the quotient by 100 to get the percentage growth rate

Add your answer

Q45. What is convexity of a bond?

Ans.

Convexity of a bond measures the sensitivity of its duration to changes in interest rates.

  • Convexity helps investors understand how the price of a bond will change in response to interest rate movements.

  • It provides a more accurate estimate of the bond's price sensitivity compared to duration alone.

  • Higher convexity means the bond's price is more sensitive to interest rate changes.

  • Convexity is important for managing interest rate risk in bond portfolios.

  • For example, a bond with ...read more

Add your answer

Q46. What are contracts in SAP SD?

Ans.

Contracts in SAP SD are legally binding agreements between a company and a customer for the sale of products or services.

  • Contracts define the terms and conditions of the sale, including pricing, delivery dates, and payment terms.

  • They can be created for individual customers or for specific customer groups.

  • Contracts can be used to manage long-term relationships with customers and ensure consistent pricing and delivery terms.

  • Examples include quantity contracts, value contracts, ...read more

Add your answer

Q47. List down controls in change management process

Ans.

Controls in change management process

  • Establishing a change advisory board (CAB)

  • Creating a change management plan

  • Performing impact analysis

  • Testing and validating changes

  • Implementing changes during scheduled maintenance windows

  • Documenting changes and maintaining a change log

  • Performing post-implementation reviews

  • Reverting changes if necessary

Add your answer

Q48. Instances in which you found fraud

Ans.

Identified fraudulent billing practices in a healthcare organization

  • Discrepancies in billing records compared to services provided

  • Inconsistencies in patient diagnoses and treatments

  • Unusual patterns of claims submission

  • Collaboration with internal audit team to investigate further

Add your answer

Q49. How gc works in Java?

Ans.

GC in Java manages memory by freeing up unused objects.

  • GC runs automatically in the background

  • It identifies and removes objects that are no longer in use

  • Different types of GC algorithms are available

  • GC can impact application performance

  • Explicitly calling System.gc() may not always trigger GC

Add your answer

Q50. Hibernate isolation and propagation levels

Ans.

Explanation of Hibernate isolation and propagation levels

  • Hibernate isolation levels define the degree of locking and visibility of data during transactions

  • There are four isolation levels: READ_UNCOMMITTED, READ_COMMITTED, REPEATABLE_READ, SERIALIZABLE

  • Propagation levels define how transactions are propagated between different methods or threads

  • There are seven propagation levels: REQUIRED, REQUIRES_NEW, SUPPORTS, MANDATORY, NEVER, NOT_SUPPORTED, NESTED

Add your answer

Q51. Speak 10 min on the given topic.

Ans.

Discussing the impact of technology on modern society.

  • Introduction to technology and its evolution over time

  • Positive impacts of technology on communication, healthcare, and education

  • Negative impacts such as privacy concerns and job displacement

  • Future implications of technology like AI and automation

  • Examples like smartphones, social media, and self-driving cars

Add your answer

Q52. Mitre Attack Detail Explanation with TTP

Ans.

Mitre Attack Framework provides a comprehensive list of tactics, techniques, and procedures (TTPs) used by attackers.

  • Mitre Attack Framework categorizes cyber threats into tactics such as Initial Access, Execution, Persistence, etc.

  • Each tactic includes specific techniques used by attackers, such as Phishing, Exploit Public-Facing Application, etc.

  • TTPs are detailed descriptions of how attackers carry out specific techniques, including tools, procedures, and behaviors.

  • For exampl...read more

Add your answer

Q53. Cost structure for a hospital chain

Ans.

Cost structure for a hospital chain includes expenses like staff salaries, medical supplies, equipment maintenance, and facility upkeep.

  • Staff salaries - includes doctors, nurses, administrative staff

  • Medical supplies - medications, surgical equipment, PPE

  • Equipment maintenance - regular servicing and repairs

  • Facility upkeep - utilities, cleaning services, renovations

Add your answer

Q54. What is Third Party Process?

Ans.

Third Party Process involves outsourcing certain business functions to external service providers.

  • Third Party Process involves outsourcing non-core business functions to external service providers.

  • Companies may outsource tasks such as payroll processing, IT services, customer support, etc.

  • Third party providers are specialized in their respective fields and can often perform tasks more efficiently.

  • Outsourcing can help companies reduce costs, improve focus on core activities, a...read more

Add your answer

Q55. JDA Appeals Amendments TDS Why Ey

Ans.

JDA, Appeals, Amendments, TDS are all related to tax consulting. Ey is a leading consulting firm in the field.

  • JDA stands for Joint Development Agreement, a legal contract between two or more parties to develop a property.

  • Appeals refer to the process of challenging a decision made by a government authority, such as a tax assessment.

  • Amendments are changes made to a legal document or contract, often to correct errors or update information.

  • TDS stands for Tax Deducted at Source, w...read more

Add your answer

Q56. Difference between truncate and delete

Ans.

Truncate is a DDL command that removes all rows from a table, while delete is a DML command that removes specific rows.

  • Truncate is faster than delete as it does not log individual row deletions.

  • Truncate resets identity column values, while delete does not.

  • Truncate cannot be rolled back, while delete can be rolled back using a transaction.

  • Truncate does not fire triggers, while delete does.

  • Truncate is a table-level operation, while delete is a row-level operation.

View 1 answer

Q57. Audit and Financial status definition

Ans.

Audit and financial status refer to the examination and evaluation of a company's financial records and overall financial health.

  • Audit involves reviewing financial statements, transactions, and internal controls to ensure accuracy and compliance with regulations.

  • Financial status refers to a company's overall financial health, including its profitability, liquidity, and solvency.

  • Both audit and financial status are important for investors, creditors, and other stakeholders to m...read more

Add your answer

Q58. Prepare the balancesheet

Ans.

Preparing a balance sheet involves listing assets, liabilities, and equity of a company at a specific point in time.

  • List all assets, including current and fixed assets

  • List all liabilities, including current and long-term liabilities

  • Calculate equity by subtracting liabilities from assets

  • Ensure the balance sheet balances by ensuring assets equal liabilities plus equity

Add your answer

Q59. What is option theta?

Ans.

Option theta measures the rate of change in the price of an option with respect to time decay.

  • Theta is a component of options pricing that measures the time decay of an option's value.

  • It represents the amount that an option's price will decrease for each day that passes.

  • Theta is typically negative for long options positions and positive for short options positions.

  • For example, if an option has a theta of -0.05, it means the option's price will decrease by $0.05 per day.

Add your answer

Q60. What is linear regression?

Ans.

Linear regression is a statistical method used to model the relationship between a dependent variable and one or more independent variables.

  • Linear regression aims to find the best-fitting straight line that describes the relationship between variables.

  • It is commonly used for predicting outcomes based on input variables.

  • The equation for a simple linear regression model is y = mx + b, where y is the dependent variable, x is the independent variable, m is the slope, and b is the...read more

Add your answer

Q61. Singleton vs Scope vs Transient

Ans.

Singleton, Scope, and Transient are different ways of managing object instances in dependency injection.

  • Singleton creates only one instance of an object and shares it across the application.

  • Scope creates a new instance of an object for each request or session.

  • Transient creates a new instance of an object every time it is requested.

  • Singleton is useful for objects that are expensive to create and need to be shared across the application.

  • Scope is useful for objects that need to ...read more

Add your answer

Q62. Explain key risks in H2R process

Ans.

Key risks in Hire to Retire (H2R) process include data security, compliance, and employee dissatisfaction.

  • Data security risks include unauthorized access to employee data, data breaches, and cyber attacks.

  • Compliance risks include non-compliance with labor laws, tax regulations, and data privacy laws.

  • Employee dissatisfaction risks include errors in payroll processing, delays in benefits administration, and poor communication.

  • Other risks include inaccurate record keeping, lack ...read more

Add your answer

Q63. Recently adapted Ind As's

Ans.

Ind AS's are Indian Accounting Standards converged with IFRS.

  • Ind AS's are applicable to certain classes of companies in India.

  • They aim to bring transparency and comparability in financial reporting.

  • Ind AS's have been adapted from IFRS with certain modifications.

  • They cover various aspects of accounting such as revenue recognition, leases, financial instruments, etc.

Add your answer

Q64. What is rank function

Ans.

Rank function is used to assign a rank to each row within a partition of a result set.

  • Rank function assigns a unique rank to each row within a partition of a result set.

  • It does not skip ranks in case of ties, meaning if two rows have the same value, they will have the same rank.

  • Example: If there are three rows with values 10, 20, and 20, the ranks assigned would be 1, 2, and 2 respectively.

Add your answer

Q65. Latest developments in IDT

Ans.

IDT has made significant progress in the development of CRISPR-based gene editing tools.

  • IDT has launched a new CRISPR enzyme called Alt-R Cas12a (Cpf1) that can target AT-rich regions of the genome.

  • IDT has also developed a new CRISPR-Cas9 system that allows for multiplexed gene editing.

  • IDT has expanded its portfolio of PrimeTime qPCR assays for gene expression analysis.

  • IDT has introduced a new line of xGen Lockdown Panels for targeted sequencing.

  • IDT has partnered with Caribou...read more

Add your answer

Q66. Procedures related to domestic enquiry

Ans.

Procedures related to domestic enquiry involve conducting a fair investigation and providing the accused with an opportunity to defend themselves.

  • Ensure a neutral and unbiased investigation is conducted

  • Provide the accused with a written notice of the allegations against them

  • Allow the accused to present their defense and evidence

  • Ensure a fair and impartial decision is made based on the evidence presented

  • Document the entire process and decision for future reference

Add your answer

Q67. explain the flow of osi layers

Ans.

The OSI model has 7 layers that define how data is transmitted over a network.

  • Layer 1 (Physical) - transmits raw data over physical medium

  • Layer 2 (Data Link) - organizes data into frames and handles errors

  • Layer 3 (Network) - routes data between networks

  • Layer 4 (Transport) - manages end-to-end connections and reliability

  • Layer 5 (Session) - establishes, manages, and terminates sessions

  • Layer 6 (Presentation) - formats data for presentation to the application layer

  • Layer 7 (Applic...read more

Add your answer

Q68. What is delta table

Ans.

Delta table is a type of table in Apache Spark that supports ACID transactions and time travel capabilities.

  • Delta table is used for managing large-scale data lakes in Spark.

  • It allows users to perform insert, update, and delete operations on data.

  • Delta table provides features like ACID transactions, schema enforcement, and data versioning.

  • It supports time travel queries to view data at different points in time.

  • Delta table is commonly used in data engineering and analytics pipe...read more

Add your answer

Q69. Willing for extensive travel

Ans.

Yes

  • I am willing to travel extensively for work.

  • I have experience traveling for client meetings and project implementations.

  • I am comfortable with frequent travel and adapting to different environments.

  • I understand the importance of building relationships with clients through face-to-face interactions.

Add your answer

Q70. End to End HR lifecycle

Ans.

End to End HR lifecycle involves recruitment, onboarding, training, performance management, and offboarding.

  • Recruitment: Attracting, sourcing, and selecting candidates for job openings.

  • Onboarding: Introducing new hires to the organization, its culture, and their roles.

  • Training: Providing employees with necessary skills and knowledge to perform their jobs effectively.

  • Performance Management: Evaluating and rewarding employees based on their performance.

  • Offboarding: Managing the...read more

Add your answer

Q71. What is Audit Risk

Ans.

Audit risk is the risk that auditors may issue an incorrect opinion on financial statements.

  • Audit risk is the risk that auditors fail to detect material misstatements in financial statements.

  • It is composed of inherent risk, control risk, and detection risk.

  • Inherent risk is the risk of material misstatement without considering internal controls.

  • Control risk is the risk that internal controls fail to prevent or detect material misstatements.

  • Detection risk is the risk that audit...read more

Add your answer

Q72. fortigate firewall packet flow

Ans.

FortiGate firewall packet flow

  • Incoming packet is received by the FortiGate interface

  • Packet is checked against security policies

  • If allowed, packet is forwarded to the appropriate destination

  • If denied, packet is dropped or rejected

  • Outgoing packet is processed in reverse order

Add your answer

Q73. Sorting algorithm

Ans.

Sorting algorithm is a method of arranging elements in a specific order.

  • Sorting algorithms can be classified as comparison-based or non-comparison-based.

  • Examples of comparison-based sorting algorithms are bubble sort, insertion sort, and quicksort.

  • Examples of non-comparison-based sorting algorithms are counting sort, radix sort, and bucket sort.

Add your answer

Q74. Working of Hashmap

Ans.

Hashmap is a data structure that stores key-value pairs and allows constant time access to values based on their keys.

  • Hashmap uses a hash function to map keys to indices in an array.

  • Collisions can occur when two keys map to the same index, which can be resolved using techniques like chaining or open addressing.

  • Hashmap provides O(1) time complexity for insertion, deletion, and retrieval of values based on their keys.

  • Example: HashMap map = new HashMap<>(); map.put("apple", 1); ...read more

Add your answer

Q75. name place animal thing

Ans.

Paris, Lion, Apple, Table

  • Paris - Capital city of France

  • Lion - Majestic wild animal

  • Apple - Common fruit

  • Table - Furniture for dining or working

Add your answer

Q76. statistical test for pd

Ans.

The statistical test for PD is the t-test.

  • The t-test is used to compare the means of two groups.

  • It determines if there is a significant difference between the means.

  • Example: A t-test can be used to compare the mean scores of a control group and a treatment group in a study on Parkinson's disease.

Add your answer

Q77. Types of servers?

Ans.

Types of servers include web servers, email servers, file servers, and database servers.

  • Web servers - serve web pages and content over the internet (e.g. Apache, Nginx)

  • Email servers - handle email communication (e.g. Microsoft Exchange, Postfix)

  • File servers - store and manage files for network users (e.g. Windows File Server, Samba)

  • Database servers - manage databases and allow access to data (e.g. MySQL, Oracle)

Add your answer

Q78. Describe CIA triad

Ans.

CIA triad is a model designed to guide policies for information security within an organization.

  • CIA stands for Confidentiality, Integrity, and Availability

  • Confidentiality ensures that information is only accessible to those who are authorized to view it

  • Integrity ensures that information is accurate and trustworthy

  • Availability ensures that information is accessible when needed

  • Examples include encrypting sensitive data for confidentiality, implementing checksums for data integr...read more

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Pfizer

based on 115 interviews
5 Interview rounds
Technical Round - 1
Technical Round - 2
One-on-one Round
HR Round - 1
HR Round - 2
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Consultant Interview Questions from Similar Companies

3.8
 • 44 Interview Questions
4.0
 • 19 Interview Questions
3.8
 • 18 Interview Questions
3.8
 • 15 Interview Questions
3.7
 • 13 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter