HTC Global Services
40+ Interview Questions and Answers
Q1. What is the access method of vsam file to acceptboth sequential and random record
VSAM file can be accessed using Alternate Index to allow both sequential and random record access.
Alternate Index is a VSAM feature that allows records to be accessed randomly.
Sequential access can be achieved by using the primary index.
Alternate Index can be created using IDCAMS utility.
COBOL programs can use VSAM file with Alternate Index.
Alternate Index can improve performance by reducing I/O operations.
Q2. What are the design patterns that you know about
Design patterns are reusable solutions to common software problems.
Creational patterns: Singleton, Factory, Abstract Factory, Builder
Structural patterns: Adapter, Bridge, Composite, Decorator, Facade, Flyweight, Proxy
Behavioral patterns: Chain of Responsibility, Command, Interpreter, Iterator, Mediator, Memento, Observer, State, Strategy, Template Method, Visitor
Q3. If you are foreseeing a delay in sprint what would you do as scrum master
As a Scrum Master, I would take the following steps to address a delay in sprint:
Identify the root cause of the delay
Discuss the issue with the team and stakeholders
Re-prioritize the backlog and adjust sprint goals if necessary
Identify potential solutions and implement them
Monitor progress and adjust as needed
Q4. Write sample classes spring boot … entity service and controller layers with proper annotations
Sample classes for Spring Boot entity, service, and controller layers with annotations
Create entity classes with @Entity and @Id annotations
Create service classes with @Service annotation and inject repository classes with @Autowired annotation
Create controller classes with @RestController and @RequestMapping annotations
Use @GetMapping, @PostMapping, @PutMapping, and @DeleteMapping annotations for HTTP methods
Use @RequestBody and @PathVariable annotations for request paramete...read more
Q5. Internal implementation of hash map and use comparator
Hash map is an internal data structure that maps keys to values. Comparator is used to compare objects for sorting.
Hash map uses a hash function to map keys to indices in an array
Comparator is used to compare objects for sorting in collections like TreeSet or TreeMap
Example of hash map implementation in Java: HashMap
Example of using a comparator in Java: Collections.sort(list, comparator)
Q6. To define file in Dynamic mode.
Dynamic mode file is a file that is created and modified during runtime.
Dynamic mode files are created and modified during runtime
They are not stored on disk, but in memory
Examples include temporary files and buffers
Q7. Database design with normalization process
Normalization is a process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization involves breaking down a table into smaller tables and establishing relationships between them.
There are different levels of normalization, with each level having specific rules to follow.
Normalization helps to prevent data inconsistencies and anomalies.
Examples of normalization include converting repeating groups into separate tables and creating a juncti...read more
Q8. What are the tools you have used for agile.
I have used JIRA, Trello, and Kanban boards for agile project management.
JIRA for sprint planning, backlog management, and issue tracking
Trello for visualizing the workflow and progress of tasks
Kanban boards for managing work in progress and limiting work in progress
Q9. Expain user stories & use case for the banking app where the user wants to login into the app with password
User stories and use case for logging into a banking app with a password
User story: As a user, I want to securely login to my banking app using my password
Use case: User enters username and password, app verifies credentials and grants access
Example: User enters username 'john.doe' and password 'password123', app authenticates and logs in
Q10. wat is asp.net and how we cater for filter on this application
ASP.NET is a web application framework developed by Microsoft to build dynamic web pages and applications.
ASP.NET is used to create web applications and websites
It supports multiple programming languages like C#, VB.NET, etc.
Filters in ASP.NET are used to intercept and modify HTTP requests and responses
Filters can be used for authentication, logging, caching, etc.
Q11. APP-Payment Methods, What is Asset Accounting. BRS Configuration steps.
APP-Payment Methods, Asset Accounting, BRS Configuration steps
APP (Automatic Payment Program) in SAP FICO allows for automatic payment processing based on predefined criteria
Asset Accounting in SAP FICO is used to manage and control assets within an organization
BRS (Bank Reconciliation Statement) configuration involves setting up bank accounts, defining posting rules, and reconciling bank statements
Q12. What is Asset Accounting, APP-Payment Methods, BRS-Configuration.FI-MM, FI-SD Configurations.
Asset Accounting involves managing fixed assets, APP-Payment Methods are used for automatic payments, BRS-Configuration is for bank reconciliation, and FI-MM, FI-SD Configurations are integrations with MM and SD modules.
Asset Accounting is used to manage fixed assets such as buildings, machinery, and vehicles.
APP-Payment Methods are used to define how payments are processed automatically in SAP.
BRS-Configuration involves setting up bank reconciliation statements to match comp...read more
Q13. How can you measure scrum team effectiveness
Scrum team effectiveness can be measured through various metrics such as sprint velocity, team satisfaction, and product quality.
Sprint velocity: measure of how much work the team can complete in a sprint
Team satisfaction: measure of how happy the team is with their work and collaboration
Product quality: measure of how well the team is delivering a high-quality product
Retrospective feedback: measure of how well the team is improving and addressing issues
Burn-down charts: meas...read more
Q14. wat is web api and how its related to the mvc application
Web API is a framework for building HTTP services that can be consumed by a variety of clients.
Web API is a part of the ASP.NET framework
It allows developers to build RESTful services
It can be used to create APIs for web applications built using MVC
Web API can return data in various formats such as JSON, XML, etc.
It supports HTTP verbs such as GET, POST, PUT, DELETE, etc.
Q15. What are the basic requirements in our company needs?
The basic requirements in your company are skilled workers, efficient equipment, and proper safety measures.
Skilled workers with relevant experience and qualifications
Efficient equipment that meets industry standards
Proper safety measures to ensure a safe working environment
Regular maintenance and upkeep of equipment
Effective communication and teamwork among employees
Adequate resources and budget for production needs
Q16. What is difference between value stream and flow
Value stream is the end-to-end process of delivering value to the customer, while flow is the smooth and uninterrupted movement of work through the process.
Value stream focuses on the entire process from start to finish, including all the steps and stakeholders involved.
Flow focuses on the movement of work through the process, with the goal of minimizing delays, bottlenecks, and waste.
Value stream is more strategic, while flow is more tactical.
Value stream is concerned with d...read more
Q17. what are the oops concepts and how we use them?
OOPs concepts are fundamental principles in object-oriented programming that help in organizing and designing code.
Encapsulation: Bundling data and methods that operate on the data into a single unit (class). Example: Class Car with properties like make, model, and methods like start(), stop().
Inheritance: Ability of a class to inherit properties and behavior from another class. Example: Class SUV inheriting from Class Car.
Polymorphism: Ability to present the same interface f...read more
Q18. What exactly you do when requirements gets clashed between stake holder & business analyst
When requirements clash between stakeholder & business analyst, I facilitate open communication, prioritize needs, seek compromise, and involve higher management if necessary.
Facilitate open communication between stakeholder and business analyst to understand concerns
Prioritize needs based on impact and importance to the project
Seek compromise by finding common ground and exploring alternative solutions
Involve higher management if necessary to make final decisions and resolve...read more
Q19. When an issue is fixed will you perform regression test or sanity test
It depends on the severity and impact of the issue and the scope of the fix.
If the issue was critical and had a wide impact, a full regression test may be necessary.
If the issue was minor and the fix was isolated, a sanity test may suffice.
The decision should be based on risk assessment and the scope of the changes made.
Both regression and sanity tests have their own importance and should be used appropriately.
Q20. What is AWS? What is EC2 Instance? What is S3? What is Route 53?
AWS is a cloud computing platform by Amazon. EC2 is a virtual server in AWS. S3 is a storage service. Route 53 is a DNS service.
AWS is a cloud computing platform provided by Amazon.
EC2 (Elastic Compute Cloud) is a web service that provides resizable compute capacity in the cloud.
S3 (Simple Storage Service) is an object storage service that offers scalability, data availability, security, and performance.
Route 53 is a scalable Domain Name System (DNS) web service designed to r...read more
Q21. Tell me the journal entries for Accrual, deferred revenues
Accrual journal entry records revenue or expenses before cash is exchanged, while deferred revenue journal entry records cash received before revenue is earned.
Accrual journal entry: Debit accounts receivable/accrued revenue, credit revenue
Deferred revenue journal entry: Debit cash, credit deferred revenue/liability
Accrual example: Debit Accounts Receivable $1,000, credit Service Revenue $1,000
Deferred revenue example: Debit Cash $500, credit Deferred Revenue $500
Q22. What is BITS and What is BITS and RDC and schema
BITS stands for Background Intelligent Transfer Service, RDC stands for Remote Differential Compression, and schema refers to the structure of a database or system.
BITS is a Windows service that transfers files in the background, optimizing bandwidth usage and allowing for resumable transfers.
RDC is a feature in Windows that enables efficient synchronization of files by only transferring the differences between files.
Schema in the context of databases refers to the organizati...read more
Q23. What is meant by CI/ CD pipeline?
CI/CD pipeline stands for Continuous Integration/Continuous Deployment pipeline, which automates the process of testing and deploying code changes.
CI/CD pipeline automates the process of integrating code changes from multiple developers into a shared repository (Continuous Integration).
It also automates the process of testing the integrated code and deploying it to production (Continuous Deployment).
CI/CD pipelines help in reducing manual errors, improving code quality, and i...read more
Q24. difference between array list and linked list
Array list stores elements in contiguous memory locations, while linked list stores elements in nodes with pointers to the next node.
Array list allows random access to elements based on index, while linked list requires traversal from the beginning to access elements.
Insertions and deletions are faster in linked list as it only requires updating pointers, while in array list it may require shifting elements.
Example: Array list - ArrayList in Java, Linked list - LinkedList in ...read more
Q25. What is your knowledge about HTC Global services
HTC Global Services is a global provider of IT and business process services.
HTC Global Services offers a wide range of services including application development, maintenance, and support.
They also provide business process outsourcing services such as finance and accounting, human resources, and procurement.
HTC Global Services has a strong presence in industries like healthcare, banking, and manufacturing.
The company is known for its innovative solutions and customer-centric...read more
Q26. why string is immutable?
String is immutable in order to ensure data integrity and security.
Immutable strings prevent accidental data modification, ensuring data integrity.
Immutable strings enhance security by preventing unauthorized access or tampering.
Immutable strings allow for more efficient memory management and optimization.
Examples: Java, Python, and C# all have immutable string objects.
Q27. Solid principles and how to implement
Solid principles are a set of five design principles for writing maintainable and scalable code.
Single Responsibility Principle: A class should have only one reason to change.
Open/Closed Principle: Classes should be open for extension but closed for modification.
Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses without affecting the program's correctness.
Interface Segregation Principle: Clients should not be forced to ...read more
Q28. What is Management point
Management point is a server role in SCCM that provides policy and service location information to clients.
Management point communicates with clients to provide policy assignments, software distribution, and inventory information.
It helps clients locate content, such as software updates or applications, by providing information about distribution points.
Management point also helps clients find site systems that offer services like software distribution, software updates, and ...read more
Q29. What is meant by Devops?
Devops is a software development methodology that combines software development (Dev) with IT operations (Ops) to improve collaboration and productivity.
Devops focuses on automating and streamlining the software development and deployment process.
It emphasizes communication and collaboration between development and operations teams.
Devops aims to shorten the development lifecycle and provide continuous delivery of high-quality software.
Tools commonly used in Devops include Do...read more
Q30. do you know about microservice
Microservices are a software development technique where applications are composed of small, independent services that communicate over well-defined APIs.
Microservices break down applications into smaller, independently deployable services
Each service is responsible for a specific function and communicates with other services via APIs
Microservices allow for easier scalability, flexibility, and maintenance of applications
Examples of companies using microservices include Netfli...read more
Q31. What is secondary site
A secondary site in SCCM is a site system role that can be installed to help manage content distribution and client communication in remote locations.
Secondary sites are used to manage clients in remote locations with limited bandwidth
They do not have their own database, but rely on the primary site for data storage
They help reduce network traffic by caching content locally for distribution to clients
Secondary sites are managed by the primary site server
Q32. What is distribution point
A distribution point is a site system role in SCCM that stores files for clients to download during software deployment.
Distribution points store software packages, applications, updates, and operating system images.
Clients connect to distribution points to download content for installation.
Distribution points can be located on servers, workstations, or even cloud services like Azure.
They help in reducing network traffic by allowing clients to download content locally.
Q33. What do you do in API Testing
API testing involves testing the functionality, reliability, performance, and security of APIs.
Testing API endpoints and methods
Validating input and output data
Verifying error handling and response codes
Testing for security vulnerabilities
Load testing and performance testing
Automating tests using tools like Postman or SoapUI
Q34. After 1 year what will be
After 1 year, the data conversion specialist will have gained valuable experience and expertise in handling various data conversion projects.
Increased proficiency in data conversion tools and software
Improved understanding of data formats and structures
Enhanced problem-solving skills in resolving data conversion issues
Expanded knowledge of data quality and integrity standards
Possibly advanced to more complex data conversion projects or roles
Q35. Performance optimization techniques in Pyspark
Performance optimization techniques in Pyspark involve partitioning, caching, and using efficient transformations.
Partitioning data to distribute workload evenly
Caching intermediate results to avoid recomputation
Using efficient transformations like map, filter, and reduce
Avoiding unnecessary shuffling of data
Q36. what is penetration testing?
Penetration testing is a method of testing the security of a system by simulating an attack from a malicious source.
It involves identifying vulnerabilities in a system and attempting to exploit them.
Penetration testing can be done manually or with the help of automated tools.
The goal is to find weaknesses in the system before a real attacker does.
Penetration testing can be performed on various types of systems, including web applications, networks, and mobile devices.
Examples...read more
Q37. BRS Configuration step
BRS Configuration step involves setting up Bank Reconciliation Statement in SAP FICO module.
Define House Bank in SAP
Define Bank Sub-Accounts
Assign Bank Sub-Accounts to House Bank
Configure Automatic Bank Statement Upload
Define Posting Rules for Bank Statement Items
Q38. What is springboot
Spring Boot is a framework that simplifies the development of Java applications by providing pre-configured settings and tools.
Spring Boot eliminates the need for manual configuration by providing defaults for most settings.
It allows for easy creation of stand-alone, production-grade Spring-based applications.
Spring Boot includes embedded servers like Tomcat, Jetty, or Undertow for deploying applications.
It offers a wide range of plugins to enhance productivity and reduce dev...read more
Q39. what is Security testing?
Security testing is the process of identifying vulnerabilities and weaknesses in a system to ensure it is secure from potential threats.
It involves testing the system for potential security breaches and vulnerabilities
It includes testing for authentication and authorization mechanisms
It also involves testing for data confidentiality and integrity
Examples include penetration testing, vulnerability scanning, and code review
The goal is to ensure the system is secure from potenti...read more
Q40. Relationship between driver and vehicle
The relationship between a driver and a vehicle is the connection and interaction between a person operating a vehicle and the vehicle itself.
The driver is responsible for operating the vehicle safely and following traffic laws.
The vehicle provides transportation for the driver and passengers.
The driver must maintain the vehicle by performing regular maintenance and repairs.
The driver's behavior and actions can impact the safety and performance of the vehicle.
The relationship...read more
Q41. what is pointer what is array
A pointer is a variable that stores the memory address of another variable. An array is a collection of similar data types.
Pointers allow for dynamic memory allocation and manipulation.
Arrays can be one-dimensional or multi-dimensional.
Example of pointer: int *ptr = # where num is an integer variable.
Example of array: char str[10] = {'H', 'e', 'l', 'l', 'o', ' ', 'W', 'o', 'r', 'l', 'd'};
Q42. Give an use case to solve
Develop a system to track and manage inventory for a retail store.
Utilize AWS DynamoDB to store inventory data
Implement AWS Lambda functions for real-time updates
Use AWS API Gateway for managing API endpoints
Leverage AWS S3 for storing product images
Q43. Transaction in Java
A transaction in Java is a unit of work that is performed as a single, indivisible operation.
Transactions ensure data integrity by either committing all changes or rolling them back if an error occurs.
Transactions are typically used in database operations to ensure consistency.
In Java, transactions are commonly implemented using frameworks like Spring's @Transactional annotation.
Q44. What is Accruals
Accruals are expenses incurred but not yet paid or recorded.
Accruals are expenses that have been incurred but not yet paid for.
They are recorded in the financial statements to reflect the true financial position of a company.
Accruals help match expenses with revenues in the same accounting period.
Examples include accrued salaries, interest, and taxes.
Accruals are necessary for accurate financial reporting.
Q45. What prepaid recalss
Prepaid recalls are prepaid expenses that are reversed in the subsequent accounting period.
Prepaid recalls are expenses that have been paid in advance but are recognized as expenses in the following accounting period.
They are typically recorded as assets on the balance sheet until they are recognized as expenses.
Common examples of prepaid recalls include prepaid rent, insurance premiums, and subscription fees.
Q46. What is SAP basis
SAP Basis is the technical foundation that enables SAP applications to function.
SAP Basis includes the administration of the SAP system, database, and operating system.
It involves tasks such as system monitoring, performance tuning, and troubleshooting.
SAP Basis consultants are responsible for ensuring the smooth running of SAP applications.
Examples of SAP Basis tasks include system upgrades, patch management, and user management.
Q47. wht is ur sal expectations
My salary expectations are based on my experience, skills, and the market rate for the position.
Consider my years of experience in the industry
Research the average salary range for similar positions in the market
Factor in the cost of living in the location of the job
Be open to negotiation based on the overall compensation package offered
Q48. Hoisting in JS?
Hoisting in JavaScript refers to the behavior where variable and function declarations are moved to the top of their containing scope during the compilation phase.
Variable declarations are hoisted but not their initializations.
Function declarations are fully hoisted, meaning they can be called before they are declared.
Hoisting can lead to unexpected behavior if not understood properly.
Top HR Questions asked in null
Interview Process at null
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month