Ernst & Young
30+ Kiwiqa Services Interview Questions and Answers
Q1. list tuple difference Dictionary and list comprehension Decorators with example Sequencial non sequencial data types Pandas Create dataframe from dictionary Fillna, Merge Difference between joins append insert ...
read moreInterview questions on Python programming concepts and tools.
List and tuple are both sequence data types, but tuples are immutable.
List comprehension is a concise way to create lists based on existing lists.
Decorators are functions that modify the behavior of other functions.
Sequential data types are accessed in a specific order, while non-sequential data types are not.
Pandas is a Python library for data manipulation and analysis.
DataFrames can be created from dictionaries us...read more
Q2. Expalin what is supply chain management?
Supply chain management is the coordination and management of activities involved in the production and delivery of products and services.
It involves the planning, sourcing, manufacturing, and delivery of products or services
It aims to optimize the flow of goods and services from the supplier to the customer
It involves managing relationships with suppliers and customers
It helps to reduce costs, improve efficiency, and increase customer satisfaction
Examples include inventory m...read more
Q3. How would you explain analytics to your grandfather
Analytics is using data to find patterns and insights that help make better decisions.
Analytics is like solving a puzzle with data
It helps us understand what happened, why it happened, and what might happen in the future
For example, it can help a business figure out which products are selling well and why
Or it can help a doctor predict which patients are at risk for certain diseases
It's like having a crystal ball that helps us make smarter choices
Q4. FAR check if each one FA is located severly (proced"s involved)
To check if each FA is located severely, follow the FAR procedures.
Refer to FAR Part 45 for definitions and identification of FAs
Check the records of each FA to determine its location
Ensure that the location of each FA is compliant with applicable regulations
If any FA is found to be located severely, take appropriate corrective action
Q5. How to make live Dashboards with Power BI
Live dashboards can be created in Power BI by connecting to real-time data sources and using features like streaming datasets and push datasets.
Connect to real-time data sources such as Azure Stream Analytics, Azure Event Hubs, or Power Automate
Create streaming datasets to continuously update data in real-time
Use push datasets to push data from external sources to Power BI
Design visualizations and add them to a dashboard
Set up automatic data refresh intervals for real-time up...read more
Q6. How do hospitals should open up business post covid
Hospitals should open up business post covid by implementing strict safety measures, increasing telemedicine services, and prioritizing high-risk patients.
Implement strict safety measures such as mandatory mask-wearing, temperature checks, and frequent sanitization
Increase telemedicine services to reduce in-person visits and limit exposure
Prioritize high-risk patients for appointments and procedures to ensure their safety
Gradually resume elective surgeries and procedures whil...read more
Q7. Value of tangible asset as per accounting standard
Tangible assets are physical assets that have a measurable value and are used in business operations.
Tangible assets are recorded on the balance sheet at their original cost minus any accumulated depreciation.
Examples of tangible assets include buildings, equipment, vehicles, and land.
The value of tangible assets can be affected by factors such as market demand, technological advancements, and wear and tear.
Tangible assets are important for businesses as they can be used as c...read more
Q8. Decision tree,Random forest.How the algorithm works.R square, adjusted r square
Decision tree and random forest are machine learning algorithms used for classification and regression tasks. R square and adjusted r square are evaluation metrics for regression models.
Decision tree is a tree-like model where each node represents a feature and each branch represents a decision rule. Random forest is an ensemble of decision trees.
Decision tree and random forest are used for both classification and regression tasks.
R square is a metric that measures the propor...read more
Q9. What is breakeven point?
Breakeven point is the level of sales at which total costs equal total revenue.
It is the point where a company neither makes a profit nor incurs a loss.
It is calculated by dividing fixed costs by the contribution margin per unit.
It helps in determining the minimum sales required to cover all costs.
It is an important tool for businesses to make informed decisions about pricing and production.
For example, if a company has fixed costs of $10,000 and a contribution margin per uni...read more
Q10. How to automate and integrate API
Automating and integrating APIs involves using tools and techniques to streamline the process of connecting and interacting with different software systems.
Use API testing tools like Postman or SoapUI to automate API calls and verify responses
Implement API integration frameworks like Apache Camel or MuleSoft to facilitate seamless communication between systems
Leverage scripting languages like Python or JavaScript to write scripts that automate API interactions
Utilize API mana...read more
Q11. How do you manage risks in daily life?
I manage risks in daily life by identifying potential risks, assessing their impact, and taking proactive measures to mitigate them.
Identifying potential risks by analyzing the situation and considering all possible outcomes
Assessing the impact of each risk on my daily life and prioritizing them based on severity
Taking proactive measures to mitigate risks, such as creating contingency plans or seeking advice from experts
Regularly reviewing and updating my risk management stra...read more
Q12. how do you manage many tasks at once?
I prioritize tasks based on deadlines and importance, use to-do lists and calendars, delegate when possible, and stay organized.
Prioritize tasks based on deadlines and importance
Use to-do lists and calendars to stay organized
Delegate tasks when possible to lighten the workload
Stay focused on one task at a time to avoid feeling overwhelmed
Q13. Difference between Statutory and Internal Audit
Statutory audit is mandatory by law while internal audit is voluntary and conducted by the company itself.
Statutory audit is conducted to ensure compliance with legal requirements and financial reporting standards.
Internal audit is conducted to evaluate the effectiveness of internal controls and identify areas for improvement.
Statutory audit is conducted by an external auditor while internal audit is conducted by the company's own employees.
Examples of statutory audit include...read more
Q14. Find the count of distinct items in a list
To find the count of distinct items in a list, use a set to remove duplicates and count the remaining items.
Create a set from the list to remove duplicates
Count the remaining items in the set
Return the count as the result
Q15. Find the non longest non repeating substring.
To find the non longest non repeating substring, we need to iterate through the string and keep track of the substrings that do not contain repeating characters.
Iterate through the string and keep track of the substrings that do not contain repeating characters
Use a hash set to keep track of the characters in the substring
If a repeating character is found, update the starting index of the substring to the next character after the first occurrence of the repeating character
Rep...read more
Q16. What do you know about Audit?
Audit is a systematic examination of financial records, statements, or operations to ensure accuracy and compliance with laws and regulations.
Audit involves reviewing financial records, statements, and operations of a company or organization.
The purpose of an audit is to ensure accuracy, reliability, and compliance with laws and regulations.
Auditors may also provide recommendations for improving financial processes and internal controls.
Types of audits include financial audit...read more
Q17. Data Cleaning Techniques mentioned in project
Data cleaning techniques include removing duplicates, handling missing values, standardizing data formats, and correcting errors.
Removing duplicates by identifying and deleting identical records
Handling missing values by imputing with mean, median, or mode
Standardizing data formats by converting text to lowercase, removing special characters, and formatting dates
Correcting errors by using data validation rules and outlier detection techniques
Q18. Calculate the growth rate?
To calculate growth rate, divide the difference between final and initial value by initial value and multiply by 100.
Subtract the initial value from the final value
Divide the result by the initial value
Multiply the quotient by 100 to get the percentage growth rate
Q19. What are contracts in SAP SD?
Contracts in SAP SD are legally binding agreements between a company and a customer for the sale of products or services.
Contracts define the terms and conditions of the sale, including pricing, delivery dates, and payment terms.
They can be created for individual customers or for specific customer groups.
Contracts can be used to manage long-term relationships with customers and ensure consistent pricing and delivery terms.
Examples include quantity contracts, value contracts, ...read more
Q20. List down controls in change management process
Controls in change management process
Establishing a change advisory board (CAB)
Creating a change management plan
Performing impact analysis
Testing and validating changes
Implementing changes during scheduled maintenance windows
Documenting changes and maintaining a change log
Performing post-implementation reviews
Reverting changes if necessary
Q21. How gc works in Java?
GC in Java manages memory by freeing up unused objects.
GC runs automatically in the background
It identifies and removes objects that are no longer in use
Different types of GC algorithms are available
GC can impact application performance
Explicitly calling System.gc() may not always trigger GC
Q22. Hibernate isolation and propagation levels
Explanation of Hibernate isolation and propagation levels
Hibernate isolation levels define the degree of locking and visibility of data during transactions
There are four isolation levels: READ_UNCOMMITTED, READ_COMMITTED, REPEATABLE_READ, SERIALIZABLE
Propagation levels define how transactions are propagated between different methods or threads
There are seven propagation levels: REQUIRED, REQUIRES_NEW, SUPPORTS, MANDATORY, NEVER, NOT_SUPPORTED, NESTED
Q23. Cost structure for a hospital chain
Cost structure for a hospital chain includes expenses like staff salaries, medical supplies, equipment maintenance, and facility upkeep.
Staff salaries - includes doctors, nurses, administrative staff
Medical supplies - medications, surgical equipment, PPE
Equipment maintenance - regular servicing and repairs
Facility upkeep - utilities, cleaning services, renovations
Q24. What is Third Party Process?
Third Party Process involves outsourcing certain business functions to external service providers.
Third Party Process involves outsourcing non-core business functions to external service providers.
Companies may outsource tasks such as payroll processing, IT services, customer support, etc.
Third party providers are specialized in their respective fields and can often perform tasks more efficiently.
Outsourcing can help companies reduce costs, improve focus on core activities, a...read more
Q25. JDA Appeals Amendments TDS Why Ey
JDA, Appeals, Amendments, TDS are all related to tax consulting. Ey is a leading consulting firm in the field.
JDA stands for Joint Development Agreement, a legal contract between two or more parties to develop a property.
Appeals refer to the process of challenging a decision made by a government authority, such as a tax assessment.
Amendments are changes made to a legal document or contract, often to correct errors or update information.
TDS stands for Tax Deducted at Source, w...read more
Q26. Audit and Financial status definition
Audit and financial status refer to the examination and evaluation of a company's financial records and overall financial health.
Audit involves reviewing financial statements, transactions, and internal controls to ensure accuracy and compliance with regulations.
Financial status refers to a company's overall financial health, including its profitability, liquidity, and solvency.
Both audit and financial status are important for investors, creditors, and other stakeholders to m...read more
Q27. Prepare the balancesheet
Preparing a balance sheet involves listing assets, liabilities, and equity of a company at a specific point in time.
List all assets, including current and fixed assets
List all liabilities, including current and long-term liabilities
Calculate equity by subtracting liabilities from assets
Ensure the balance sheet balances by ensuring assets equal liabilities plus equity
Q28. Singleton vs Scope vs Transient
Singleton, Scope, and Transient are different ways of managing object instances in dependency injection.
Singleton creates only one instance of an object and shares it across the application.
Scope creates a new instance of an object for each request or session.
Transient creates a new instance of an object every time it is requested.
Singleton is useful for objects that are expensive to create and need to be shared across the application.
Scope is useful for objects that need to ...read more
Q29. Explain key risks in H2R process
Key risks in Hire to Retire (H2R) process include data security, compliance, and employee dissatisfaction.
Data security risks include unauthorized access to employee data, data breaches, and cyber attacks.
Compliance risks include non-compliance with labor laws, tax regulations, and data privacy laws.
Employee dissatisfaction risks include errors in payroll processing, delays in benefits administration, and poor communication.
Other risks include inaccurate record keeping, lack ...read more
Q30. Recently adapted Ind As's
Ind AS's are Indian Accounting Standards converged with IFRS.
Ind AS's are applicable to certain classes of companies in India.
They aim to bring transparency and comparability in financial reporting.
Ind AS's have been adapted from IFRS with certain modifications.
They cover various aspects of accounting such as revenue recognition, leases, financial instruments, etc.
Q31. What is rank function
Rank function is used to assign a rank to each row within a partition of a result set.
Rank function assigns a unique rank to each row within a partition of a result set.
It does not skip ranks in case of ties, meaning if two rows have the same value, they will have the same rank.
Example: If there are three rows with values 10, 20, and 20, the ranks assigned would be 1, 2, and 2 respectively.
Q32. Procedures related to domestic enquiry
Procedures related to domestic enquiry involve conducting a fair investigation and providing the accused with an opportunity to defend themselves.
Ensure a neutral and unbiased investigation is conducted
Provide the accused with a written notice of the allegations against them
Allow the accused to present their defense and evidence
Ensure a fair and impartial decision is made based on the evidence presented
Document the entire process and decision for future reference
Q33. explain the flow of osi layers
The OSI model has 7 layers that define how data is transmitted over a network.
Layer 1 (Physical) - transmits raw data over physical medium
Layer 2 (Data Link) - organizes data into frames and handles errors
Layer 3 (Network) - routes data between networks
Layer 4 (Transport) - manages end-to-end connections and reliability
Layer 5 (Session) - establishes, manages, and terminates sessions
Layer 6 (Presentation) - formats data for presentation to the application layer
Layer 7 (Applic...read more
Q34. Willing for extensive travel
Yes
I am willing to travel extensively for work.
I have experience traveling for client meetings and project implementations.
I am comfortable with frequent travel and adapting to different environments.
I understand the importance of building relationships with clients through face-to-face interactions.
Q35. What is Audit Risk
Audit risk is the risk that auditors may issue an incorrect opinion on financial statements.
Audit risk is the risk that auditors fail to detect material misstatements in financial statements.
It is composed of inherent risk, control risk, and detection risk.
Inherent risk is the risk of material misstatement without considering internal controls.
Control risk is the risk that internal controls fail to prevent or detect material misstatements.
Detection risk is the risk that audit...read more
Q36. End to End HR lifecycle
End to End HR lifecycle involves recruitment, onboarding, training, performance management, and offboarding.
Recruitment: Attracting, sourcing, and selecting candidates for job openings.
Onboarding: Introducing new hires to the organization, its culture, and their roles.
Training: Providing employees with necessary skills and knowledge to perform their jobs effectively.
Performance Management: Evaluating and rewarding employees based on their performance.
Offboarding: Managing the...read more
Q37. fortigate firewall packet flow
FortiGate firewall packet flow
Incoming packet is received by the FortiGate interface
Packet is checked against security policies
If allowed, packet is forwarded to the appropriate destination
If denied, packet is dropped or rejected
Outgoing packet is processed in reverse order
Q38. Sorting algorithm
Sorting algorithm is a method of arranging elements in a specific order.
Sorting algorithms can be classified as comparison-based or non-comparison-based.
Examples of comparison-based sorting algorithms are bubble sort, insertion sort, and quicksort.
Examples of non-comparison-based sorting algorithms are counting sort, radix sort, and bucket sort.
Q39. Working of Hashmap
Hashmap is a data structure that stores key-value pairs and allows constant time access to values based on their keys.
Hashmap uses a hash function to map keys to indices in an array.
Collisions can occur when two keys map to the same index, which can be resolved using techniques like chaining or open addressing.
Hashmap provides O(1) time complexity for insertion, deletion, and retrieval of values based on their keys.
Example: HashMap
map = new HashMap<>(); map.put("apple", 1); ...read more
More about working at Ernst & Young
Top HR Questions asked in Kiwiqa Services
Interview Process at Kiwiqa Services
Top Consultant Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month