Ernst & Young
70+ Pfizer Interview Questions and Answers
Q1. list tuple difference Dictionary and list comprehension Decorators with example Sequencial non sequencial data types Pandas Create dataframe from dictionary Fillna, Merge Difference between joins append insert...
read moreInterview questions on Python programming concepts and tools.
List and tuple are both sequence data types, but tuples are immutable.
List comprehension is a concise way to create lists based on existing lists.
Decorators are functions that modify the behavior of other functions.
Sequential data types are accessed in a specific order, while non-sequential data types are not.
Pandas is a Python library for data manipulation and analysis.
DataFrames can be created from dictionaries us...read more
Q2. Expalin what is supply chain management?
Supply chain management is the coordination and management of activities involved in the production and delivery of products and services.
It involves the planning, sourcing, manufacturing, and delivery of products or services
It aims to optimize the flow of goods and services from the supplier to the customer
It involves managing relationships with suppliers and customers
It helps to reduce costs, improve efficiency, and increase customer satisfaction
Examples include inventory m...read more
Q3. What are the top risks faced by an IT company at enterprise level?
Top risks faced by IT companies at enterprise level
Cybersecurity threats and data breaches
Lack of skilled workforce and talent retention
Dependency on third-party vendors and service providers
Compliance and regulatory issues
Technological obsolescence and disruption
Financial instability and market volatility
Q4. Power BI round: how to design dashboard? dax query, how to do schedule refresh?
Designing a Power BI dashboard involves creating a visually appealing layout, writing DAX queries to retrieve data, and scheduling refreshes.
Identify the key metrics and KPIs to display on the dashboard
Choose appropriate visualizations to represent the data
Write DAX queries to retrieve and manipulate data
Create calculated columns and measures to perform calculations
Set up data refresh schedules to ensure the dashboard is up-to-date
Consider user experience and design a user-fr...read more
Q5. What is the difference between single linked list, double linked list and circular linked list?
Single linked list has one link per node, double linked list has two links per node, and circular linked list connects the last node to the first node.
Single linked list: Each node has a reference to the next node only.
Double linked list: Each node has references to both the next and previous nodes.
Circular linked list: Last node's reference points back to the first node, forming a circle.
Q6. How would you explain analytics to your grandfather
Analytics is using data to find patterns and insights that help make better decisions.
Analytics is like solving a puzzle with data
It helps us understand what happened, why it happened, and what might happen in the future
For example, it can help a business figure out which products are selling well and why
Or it can help a doctor predict which patients are at risk for certain diseases
It's like having a crystal ball that helps us make smarter choices
Q7. For unconnected lookup how can we obtain more than 1 return value
Use a connected lookup to obtain more than 1 return value in an unconnected lookup
Use a connected lookup transformation to retrieve multiple values based on a common key
Join the output of the connected lookup with the main pipeline using a joiner transformation
Configure the connected lookup to return multiple rows for a single input key
Q8. What are the stages involved in the Loan Lifecycle?
The stages involved in the Loan Lifecycle include application, underwriting, approval, funding, and repayment.
Application: Borrower submits loan application with necessary documents.
Underwriting: Lender evaluates borrower's creditworthiness and risk.
Approval: Lender approves the loan based on underwriting results.
Funding: Loan amount is disbursed to the borrower.
Repayment: Borrower makes regular payments to repay the loan.
Q9. How do you go about performing audit of procurement function?
Audit of procurement function involves reviewing procurement policies, procedures, contracts, and vendor management.
Review procurement policies and procedures to ensure compliance with regulations and best practices
Examine contracts to ensure they are properly executed and contain necessary provisions
Evaluate vendor management practices to ensure proper due diligence and risk management
Assess procurement performance metrics to identify areas for improvement
Conduct interviews ...read more
Q10. FAR check if each one FA is located severly (proced"s involved)
To check if each FA is located severely, follow the FAR procedures.
Refer to FAR Part 45 for definitions and identification of FAs
Check the records of each FA to determine its location
Ensure that the location of each FA is compliant with applicable regulations
If any FA is found to be located severely, take appropriate corrective action
Q11. How to make live Dashboards with Power BI
Live dashboards can be created in Power BI by connecting to real-time data sources and using features like streaming datasets and push datasets.
Connect to real-time data sources such as Azure Stream Analytics, Azure Event Hubs, or Power Automate
Create streaming datasets to continuously update data in real-time
Use push datasets to push data from external sources to Power BI
Design visualizations and add them to a dashboard
Set up automatic data refresh intervals for real-time up...read more
Q12. what are the automations you have done in financial reporting project
Implemented automations in financial reporting project to streamline processes and improve accuracy.
Developed automated templates for financial statements
Utilized software to automatically generate reports based on predefined criteria
Implemented data integration tools to streamline data collection and analysis
Set up automated alerts for discrepancies or anomalies in financial data
Q13. Deduplicate table with duplicate rows using window functions
Use window functions to deduplicate table with duplicate rows
Use the ROW_NUMBER() window function to assign a unique row number to each row
Partition by the columns that you want to deduplicate on
Filter out rows where the row number is greater than 1 to keep only unique rows
Q14. Why is Binomial Model used to price American options?
The Binomial Model is used to price American options due to its ability to account for early exercise opportunities and flexibility in modeling various scenarios.
Binomial Model allows for the consideration of early exercise opportunities, which is a key feature of American options.
It is flexible in modeling different scenarios and can handle complex option structures.
The model is relatively easy to understand and implement compared to other pricing models like Black-Scholes.
I...read more
Q15. How do hospitals should open up business post covid
Hospitals should open up business post covid by implementing strict safety measures, increasing telemedicine services, and prioritizing high-risk patients.
Implement strict safety measures such as mandatory mask-wearing, temperature checks, and frequent sanitization
Increase telemedicine services to reduce in-person visits and limit exposure
Prioritize high-risk patients for appointments and procedures to ensure their safety
Gradually resume elective surgeries and procedures whil...read more
Q16. How would you digitise NBFC loan disbursement
Digitising NBFC loan disbursement involves implementing a digital platform for loan application, approval, and disbursement.
Develop a user-friendly digital platform for loan application and approval
Integrate the platform with credit bureaus for credit checks and risk assessment
Implement e-signature and e-KYC for paperless verification
Use APIs to connect with banks for fund transfer
Ensure data security and compliance with regulations
Provide customer support through chatbots an...read more
Q17. How do you prioritise risks during risk assessment?
Prioritising risks during risk assessment involves evaluating the likelihood and impact of each risk to determine which ones require immediate attention.
Assess the likelihood of each risk occurring
Evaluate the potential impact of each risk on the project or organization
Consider the interconnectedness of risks and how they may compound each other
Prioritize risks based on the combination of likelihood and impact
Focus on addressing high priority risks first to mitigate potential...read more
Q18. How to create a mortgage schedule using the excel?
To create a mortgage schedule using Excel, you can use the PMT function and create a table with columns for payment number, payment amount, principal, interest, and remaining balance.
Use the PMT function to calculate the monthly mortgage payment based on the loan amount, interest rate, and loan term.
Create a table with columns for payment number, payment amount, principal, interest, and remaining balance.
Use formulas to calculate the principal and interest portions of each pa...read more
Q19. Value of tangible asset as per accounting standard
Tangible assets are physical assets that have a measurable value and are used in business operations.
Tangible assets are recorded on the balance sheet at their original cost minus any accumulated depreciation.
Examples of tangible assets include buildings, equipment, vehicles, and land.
The value of tangible assets can be affected by factors such as market demand, technological advancements, and wear and tear.
Tangible assets are important for businesses as they can be used as c...read more
Q20. Realizing the maximum solar power potential in Nepal
Nepal can realize its maximum solar power potential by implementing policies to encourage solar energy adoption and investing in infrastructure.
Implement policies to incentivize solar energy adoption
Invest in infrastructure for solar power generation and distribution
Encourage public-private partnerships to fund solar projects
Promote awareness and education about the benefits of solar energy
Explore innovative financing options such as crowdfunding and microfinance
Leverage inte...read more
Q21. Decision tree,Random forest.How the algorithm works.R square, adjusted r square
Decision tree and random forest are machine learning algorithms used for classification and regression tasks. R square and adjusted r square are evaluation metrics for regression models.
Decision tree is a tree-like model where each node represents a feature and each branch represents a decision rule. Random forest is an ensemble of decision trees.
Decision tree and random forest are used for both classification and regression tasks.
R square is a metric that measures the propor...read more
Q22. Devise entry strategy for a conveyer belts manufacturer
Analyze market, identify potential customers, establish partnerships with distributors, and offer customized solutions.
Conduct market research to identify potential customers and competitors
Establish partnerships with distributors to expand reach
Offer customized solutions to meet specific customer needs
Invest in marketing and advertising to increase brand awareness
Provide excellent customer service to build a loyal customer base
Q23. one case on how to protect market share
To protect market share, a company can focus on innovation, customer loyalty, and competitive pricing.
Invest in research and development to create new and improved products
Offer loyalty programs and incentives to retain customers
Monitor competitors' pricing and adjust prices accordingly
Improve customer service to increase satisfaction and loyalty
Expand into new markets or segments to increase market share
Partner with other companies to offer complementary products or services...read more
Q24. Difference between where and having
WHERE is used to filter rows before grouping, HAVING is used to filter groups after grouping.
WHERE is used with SELECT, UPDATE, DELETE statements to filter rows based on a condition
HAVING is used with GROUP BY clause to filter groups based on a condition
WHERE is applied before data is grouped, HAVING is applied after data is grouped
Example: SELECT * FROM table WHERE column = value;
Example: SELECT column, COUNT(*) FROM table GROUP BY column HAVING COUNT(*) > 1;
Q25. Order of execution of SQL statements in a query
SQL statements in a query are executed in a specific order to ensure accurate results.
SQL statements are executed in the following order: FROM, WHERE, GROUP BY, HAVING, SELECT, ORDER BY.
The FROM clause retrieves data from tables, WHERE filters the data, GROUP BY groups the data, HAVING filters groups, SELECT retrieves specific columns, and ORDER BY sorts the results.
For example, in the query SELECT * FROM employees WHERE department = 'IT' ORDER BY last_name;, the order of exe...read more
Q26. What do you understand by Duration of a bond?
Duration of a bond is a measure of its sensitivity to interest rate changes.
Duration measures the weighted average time it takes for a bond's cash flows to repay its price.
It helps investors understand how much the bond's price will change in response to interest rate movements.
Longer duration bonds are more sensitive to interest rate changes than shorter duration bonds.
Duration is expressed in years and can be used to compare bonds with different maturities and coupon rates.
Q27. What is breakeven point?
Breakeven point is the level of sales at which total costs equal total revenue.
It is the point where a company neither makes a profit nor incurs a loss.
It is calculated by dividing fixed costs by the contribution margin per unit.
It helps in determining the minimum sales required to cover all costs.
It is an important tool for businesses to make informed decisions about pricing and production.
For example, if a company has fixed costs of $10,000 and a contribution margin per uni...read more
Q28. How to automate and integrate API
Automating and integrating APIs involves using tools and techniques to streamline the process of connecting and interacting with different software systems.
Use API testing tools like Postman or SoapUI to automate API calls and verify responses
Implement API integration frameworks like Apache Camel or MuleSoft to facilitate seamless communication between systems
Leverage scripting languages like Python or JavaScript to write scripts that automate API interactions
Utilize API mana...read more
Q29. Give an example of money laundering
Money laundering is the process of making illegally obtained money appear legal.
Money is moved through a series of transactions to conceal its origin
The money is often invested in legitimate businesses or assets
The launderer may use shell companies or offshore accounts to hide the money
Examples include drug trafficking, embezzlement, and tax evasion
Money laundering is a serious crime with severe penalties
Q30. How do you manage risks in daily life?
I manage risks in daily life by identifying potential risks, assessing their impact, and taking proactive measures to mitigate them.
Identifying potential risks by analyzing the situation and considering all possible outcomes
Assessing the impact of each risk on my daily life and prioritizing them based on severity
Taking proactive measures to mitigate risks, such as creating contingency plans or seeking advice from experts
Regularly reviewing and updating my risk management stra...read more
Q31. how do you manage many tasks at once?
I prioritize tasks based on deadlines and importance, use to-do lists and calendars, delegate when possible, and stay organized.
Prioritize tasks based on deadlines and importance
Use to-do lists and calendars to stay organized
Delegate tasks when possible to lighten the workload
Stay focused on one task at a time to avoid feeling overwhelmed
Q32. Difference between Statutory and Internal Audit
Statutory audit is mandatory by law while internal audit is voluntary and conducted by the company itself.
Statutory audit is conducted to ensure compliance with legal requirements and financial reporting standards.
Internal audit is conducted to evaluate the effectiveness of internal controls and identify areas for improvement.
Statutory audit is conducted by an external auditor while internal audit is conducted by the company's own employees.
Examples of statutory audit include...read more
Q33. Find the count of distinct items in a list
To find the count of distinct items in a list, use a set to remove duplicates and count the remaining items.
Create a set from the list to remove duplicates
Count the remaining items in the set
Return the count as the result
Q34. Have you worked on IOT devices?
Yes, I have worked on IOT devices in previous projects.
Developed software for IOT devices to collect and analyze data
Implemented security measures to protect IOT devices from cyber attacks
Integrated IOT devices with cloud platforms for remote monitoring and control
Q35. What do you mean by array?
An array is a data structure that stores a collection of elements, typically of the same type, in a contiguous block of memory.
Arrays have a fixed size determined at the time of declaration.
Elements in an array are accessed by their index, starting from 0.
Example: ['apple', 'banana', 'orange'] is an array of strings.
Q36. What do you mean by string?
A string is a sequence of characters used to represent text.
A string is typically enclosed in quotation marks, such as 'hello world'.
Strings can contain letters, numbers, symbols, and spaces.
Strings can be manipulated using various string functions like concatenation and substring.
Examples of strings include 'apple', '12345', and 'Hello, World!'
Q37. Find the non longest non repeating substring.
To find the non longest non repeating substring, we need to iterate through the string and keep track of the substrings that do not contain repeating characters.
Iterate through the string and keep track of the substrings that do not contain repeating characters
Use a hash set to keep track of the characters in the substring
If a repeating character is found, update the starting index of the substring to the next character after the first occurrence of the repeating character
Rep...read more
Q38. What do you know about transfer pricing
Transfer pricing refers to the setting of prices for goods and services sold between related entities within an enterprise.
Transfer pricing is used by multinational companies to allocate profits and costs between different divisions or subsidiaries.
It is important for tax purposes to ensure that transfer prices are set at arm's length, meaning they are similar to what unrelated parties would agree upon.
Transfer pricing can involve tangible goods, intangible assets, services, ...read more
Q39. what do you understand by derivatives
Derivatives are financial instruments whose value is derived from an underlying asset or group of assets.
Derivatives can be used for hedging, speculation, or arbitrage.
Common types of derivatives include options, futures, forwards, and swaps.
Derivatives allow investors to take positions on the future price movements of assets without actually owning the assets.
They can be used to manage risk by offsetting potential losses in one investment with gains in another.
Derivatives ar...read more
Q40. Explain GRc and how can SAP help there
GRC stands for Governance, Risk, and Compliance. SAP offers solutions to help organizations manage and mitigate risks.
GRC involves managing policies, procedures, and regulations to ensure compliance
SAP GRC solutions help automate risk management processes and monitor compliance
Examples of SAP GRC modules include Access Control, Process Control, and Risk Management
SAP GRC can help organizations streamline their governance processes and reduce compliance risks
Q41. Convert the table rows into columns
To convert table rows into columns, transpose the data by switching rows and columns.
Identify the unique values in the original table that will become the new columns
Create a new table with these unique values as columns and fill in the corresponding data from the original table
Transpose the data by switching rows and columns
Q42. What do you know about Audit?
Audit is a systematic examination of financial records, statements, or operations to ensure accuracy and compliance with laws and regulations.
Audit involves reviewing financial records, statements, and operations of a company or organization.
The purpose of an audit is to ensure accuracy, reliability, and compliance with laws and regulations.
Auditors may also provide recommendations for improving financial processes and internal controls.
Types of audits include financial audit...read more
Q43. Data Cleaning Techniques mentioned in project
Data cleaning techniques include removing duplicates, handling missing values, standardizing data formats, and correcting errors.
Removing duplicates by identifying and deleting identical records
Handling missing values by imputing with mean, median, or mode
Standardizing data formats by converting text to lowercase, removing special characters, and formatting dates
Correcting errors by using data validation rules and outlier detection techniques
Q44. Calculate the growth rate?
To calculate growth rate, divide the difference between final and initial value by initial value and multiply by 100.
Subtract the initial value from the final value
Divide the result by the initial value
Multiply the quotient by 100 to get the percentage growth rate
Q45. What is convexity of a bond?
Convexity of a bond measures the sensitivity of its duration to changes in interest rates.
Convexity helps investors understand how the price of a bond will change in response to interest rate movements.
It provides a more accurate estimate of the bond's price sensitivity compared to duration alone.
Higher convexity means the bond's price is more sensitive to interest rate changes.
Convexity is important for managing interest rate risk in bond portfolios.
For example, a bond with ...read more
Q46. What are contracts in SAP SD?
Contracts in SAP SD are legally binding agreements between a company and a customer for the sale of products or services.
Contracts define the terms and conditions of the sale, including pricing, delivery dates, and payment terms.
They can be created for individual customers or for specific customer groups.
Contracts can be used to manage long-term relationships with customers and ensure consistent pricing and delivery terms.
Examples include quantity contracts, value contracts, ...read more
Q47. List down controls in change management process
Controls in change management process
Establishing a change advisory board (CAB)
Creating a change management plan
Performing impact analysis
Testing and validating changes
Implementing changes during scheduled maintenance windows
Documenting changes and maintaining a change log
Performing post-implementation reviews
Reverting changes if necessary
Q48. Instances in which you found fraud
Identified fraudulent billing practices in a healthcare organization
Discrepancies in billing records compared to services provided
Inconsistencies in patient diagnoses and treatments
Unusual patterns of claims submission
Collaboration with internal audit team to investigate further
Q49. How gc works in Java?
GC in Java manages memory by freeing up unused objects.
GC runs automatically in the background
It identifies and removes objects that are no longer in use
Different types of GC algorithms are available
GC can impact application performance
Explicitly calling System.gc() may not always trigger GC
Q50. Hibernate isolation and propagation levels
Explanation of Hibernate isolation and propagation levels
Hibernate isolation levels define the degree of locking and visibility of data during transactions
There are four isolation levels: READ_UNCOMMITTED, READ_COMMITTED, REPEATABLE_READ, SERIALIZABLE
Propagation levels define how transactions are propagated between different methods or threads
There are seven propagation levels: REQUIRED, REQUIRES_NEW, SUPPORTS, MANDATORY, NEVER, NOT_SUPPORTED, NESTED
Q51. Speak 10 min on the given topic.
Discussing the impact of technology on modern society.
Introduction to technology and its evolution over time
Positive impacts of technology on communication, healthcare, and education
Negative impacts such as privacy concerns and job displacement
Future implications of technology like AI and automation
Examples like smartphones, social media, and self-driving cars
Q52. Mitre Attack Detail Explanation with TTP
Mitre Attack Framework provides a comprehensive list of tactics, techniques, and procedures (TTPs) used by attackers.
Mitre Attack Framework categorizes cyber threats into tactics such as Initial Access, Execution, Persistence, etc.
Each tactic includes specific techniques used by attackers, such as Phishing, Exploit Public-Facing Application, etc.
TTPs are detailed descriptions of how attackers carry out specific techniques, including tools, procedures, and behaviors.
For exampl...read more
Q53. Cost structure for a hospital chain
Cost structure for a hospital chain includes expenses like staff salaries, medical supplies, equipment maintenance, and facility upkeep.
Staff salaries - includes doctors, nurses, administrative staff
Medical supplies - medications, surgical equipment, PPE
Equipment maintenance - regular servicing and repairs
Facility upkeep - utilities, cleaning services, renovations
Q54. What is Third Party Process?
Third Party Process involves outsourcing certain business functions to external service providers.
Third Party Process involves outsourcing non-core business functions to external service providers.
Companies may outsource tasks such as payroll processing, IT services, customer support, etc.
Third party providers are specialized in their respective fields and can often perform tasks more efficiently.
Outsourcing can help companies reduce costs, improve focus on core activities, a...read more
Q55. JDA Appeals Amendments TDS Why Ey
JDA, Appeals, Amendments, TDS are all related to tax consulting. Ey is a leading consulting firm in the field.
JDA stands for Joint Development Agreement, a legal contract between two or more parties to develop a property.
Appeals refer to the process of challenging a decision made by a government authority, such as a tax assessment.
Amendments are changes made to a legal document or contract, often to correct errors or update information.
TDS stands for Tax Deducted at Source, w...read more
Q56. Difference between truncate and delete
Truncate is a DDL command that removes all rows from a table, while delete is a DML command that removes specific rows.
Truncate is faster than delete as it does not log individual row deletions.
Truncate resets identity column values, while delete does not.
Truncate cannot be rolled back, while delete can be rolled back using a transaction.
Truncate does not fire triggers, while delete does.
Truncate is a table-level operation, while delete is a row-level operation.
Q57. Audit and Financial status definition
Audit and financial status refer to the examination and evaluation of a company's financial records and overall financial health.
Audit involves reviewing financial statements, transactions, and internal controls to ensure accuracy and compliance with regulations.
Financial status refers to a company's overall financial health, including its profitability, liquidity, and solvency.
Both audit and financial status are important for investors, creditors, and other stakeholders to m...read more
Q58. Prepare the balancesheet
Preparing a balance sheet involves listing assets, liabilities, and equity of a company at a specific point in time.
List all assets, including current and fixed assets
List all liabilities, including current and long-term liabilities
Calculate equity by subtracting liabilities from assets
Ensure the balance sheet balances by ensuring assets equal liabilities plus equity
Q59. What is option theta?
Option theta measures the rate of change in the price of an option with respect to time decay.
Theta is a component of options pricing that measures the time decay of an option's value.
It represents the amount that an option's price will decrease for each day that passes.
Theta is typically negative for long options positions and positive for short options positions.
For example, if an option has a theta of -0.05, it means the option's price will decrease by $0.05 per day.
Q60. What is linear regression?
Linear regression is a statistical method used to model the relationship between a dependent variable and one or more independent variables.
Linear regression aims to find the best-fitting straight line that describes the relationship between variables.
It is commonly used for predicting outcomes based on input variables.
The equation for a simple linear regression model is y = mx + b, where y is the dependent variable, x is the independent variable, m is the slope, and b is the...read more
Q61. Singleton vs Scope vs Transient
Singleton, Scope, and Transient are different ways of managing object instances in dependency injection.
Singleton creates only one instance of an object and shares it across the application.
Scope creates a new instance of an object for each request or session.
Transient creates a new instance of an object every time it is requested.
Singleton is useful for objects that are expensive to create and need to be shared across the application.
Scope is useful for objects that need to ...read more
Q62. Explain key risks in H2R process
Key risks in Hire to Retire (H2R) process include data security, compliance, and employee dissatisfaction.
Data security risks include unauthorized access to employee data, data breaches, and cyber attacks.
Compliance risks include non-compliance with labor laws, tax regulations, and data privacy laws.
Employee dissatisfaction risks include errors in payroll processing, delays in benefits administration, and poor communication.
Other risks include inaccurate record keeping, lack ...read more
Q63. Recently adapted Ind As's
Ind AS's are Indian Accounting Standards converged with IFRS.
Ind AS's are applicable to certain classes of companies in India.
They aim to bring transparency and comparability in financial reporting.
Ind AS's have been adapted from IFRS with certain modifications.
They cover various aspects of accounting such as revenue recognition, leases, financial instruments, etc.
Q64. What is rank function
Rank function is used to assign a rank to each row within a partition of a result set.
Rank function assigns a unique rank to each row within a partition of a result set.
It does not skip ranks in case of ties, meaning if two rows have the same value, they will have the same rank.
Example: If there are three rows with values 10, 20, and 20, the ranks assigned would be 1, 2, and 2 respectively.
Q65. Latest developments in IDT
IDT has made significant progress in the development of CRISPR-based gene editing tools.
IDT has launched a new CRISPR enzyme called Alt-R Cas12a (Cpf1) that can target AT-rich regions of the genome.
IDT has also developed a new CRISPR-Cas9 system that allows for multiplexed gene editing.
IDT has expanded its portfolio of PrimeTime qPCR assays for gene expression analysis.
IDT has introduced a new line of xGen Lockdown Panels for targeted sequencing.
IDT has partnered with Caribou...read more
Q66. Procedures related to domestic enquiry
Procedures related to domestic enquiry involve conducting a fair investigation and providing the accused with an opportunity to defend themselves.
Ensure a neutral and unbiased investigation is conducted
Provide the accused with a written notice of the allegations against them
Allow the accused to present their defense and evidence
Ensure a fair and impartial decision is made based on the evidence presented
Document the entire process and decision for future reference
Q67. explain the flow of osi layers
The OSI model has 7 layers that define how data is transmitted over a network.
Layer 1 (Physical) - transmits raw data over physical medium
Layer 2 (Data Link) - organizes data into frames and handles errors
Layer 3 (Network) - routes data between networks
Layer 4 (Transport) - manages end-to-end connections and reliability
Layer 5 (Session) - establishes, manages, and terminates sessions
Layer 6 (Presentation) - formats data for presentation to the application layer
Layer 7 (Applic...read more
Q68. What is delta table
Delta table is a type of table in Apache Spark that supports ACID transactions and time travel capabilities.
Delta table is used for managing large-scale data lakes in Spark.
It allows users to perform insert, update, and delete operations on data.
Delta table provides features like ACID transactions, schema enforcement, and data versioning.
It supports time travel queries to view data at different points in time.
Delta table is commonly used in data engineering and analytics pipe...read more
Q69. Willing for extensive travel
Yes
I am willing to travel extensively for work.
I have experience traveling for client meetings and project implementations.
I am comfortable with frequent travel and adapting to different environments.
I understand the importance of building relationships with clients through face-to-face interactions.
Q70. End to End HR lifecycle
End to End HR lifecycle involves recruitment, onboarding, training, performance management, and offboarding.
Recruitment: Attracting, sourcing, and selecting candidates for job openings.
Onboarding: Introducing new hires to the organization, its culture, and their roles.
Training: Providing employees with necessary skills and knowledge to perform their jobs effectively.
Performance Management: Evaluating and rewarding employees based on their performance.
Offboarding: Managing the...read more
Q71. What is Audit Risk
Audit risk is the risk that auditors may issue an incorrect opinion on financial statements.
Audit risk is the risk that auditors fail to detect material misstatements in financial statements.
It is composed of inherent risk, control risk, and detection risk.
Inherent risk is the risk of material misstatement without considering internal controls.
Control risk is the risk that internal controls fail to prevent or detect material misstatements.
Detection risk is the risk that audit...read more
Q72. fortigate firewall packet flow
FortiGate firewall packet flow
Incoming packet is received by the FortiGate interface
Packet is checked against security policies
If allowed, packet is forwarded to the appropriate destination
If denied, packet is dropped or rejected
Outgoing packet is processed in reverse order
Q73. Sorting algorithm
Sorting algorithm is a method of arranging elements in a specific order.
Sorting algorithms can be classified as comparison-based or non-comparison-based.
Examples of comparison-based sorting algorithms are bubble sort, insertion sort, and quicksort.
Examples of non-comparison-based sorting algorithms are counting sort, radix sort, and bucket sort.
Q74. Working of Hashmap
Hashmap is a data structure that stores key-value pairs and allows constant time access to values based on their keys.
Hashmap uses a hash function to map keys to indices in an array.
Collisions can occur when two keys map to the same index, which can be resolved using techniques like chaining or open addressing.
Hashmap provides O(1) time complexity for insertion, deletion, and retrieval of values based on their keys.
Example: HashMap
map = new HashMap<>(); map.put("apple", 1); ...read more
Q75. name place animal thing
Paris, Lion, Apple, Table
Paris - Capital city of France
Lion - Majestic wild animal
Apple - Common fruit
Table - Furniture for dining or working
Q76. statistical test for pd
The statistical test for PD is the t-test.
The t-test is used to compare the means of two groups.
It determines if there is a significant difference between the means.
Example: A t-test can be used to compare the mean scores of a control group and a treatment group in a study on Parkinson's disease.
Q77. Types of servers?
Types of servers include web servers, email servers, file servers, and database servers.
Web servers - serve web pages and content over the internet (e.g. Apache, Nginx)
Email servers - handle email communication (e.g. Microsoft Exchange, Postfix)
File servers - store and manage files for network users (e.g. Windows File Server, Samba)
Database servers - manage databases and allow access to data (e.g. MySQL, Oracle)
Q78. Describe CIA triad
CIA triad is a model designed to guide policies for information security within an organization.
CIA stands for Confidentiality, Integrity, and Availability
Confidentiality ensures that information is only accessible to those who are authorized to view it
Integrity ensures that information is accurate and trustworthy
Availability ensures that information is accessible when needed
Examples include encrypting sensitive data for confidentiality, implementing checksums for data integr...read more
More about working at Ernst & Young
Top HR Questions asked in Pfizer
Interview Process at Pfizer
Top Consultant Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month