i
IBM
Proud winner of ABECA 2025 - AmbitionBox Employee Choice Awards
Filter interviews by
RAG (Retrieval-Augmented Generation) combines retrieval of relevant data with generative models for enhanced information synthesis.
RAG uses a two-step process: retrieval of relevant documents followed by generation of responses based on those documents.
It leverages large language models (LLMs) to generate contextually relevant answers, improving accuracy and relevance.
For example, in a customer support chatbot, RA...
The P2P process, or Procure-to-Pay, encompasses the entire procurement cycle from requisition to payment.
Initiation: The process begins with identifying a need for goods or services.
Requisition: A purchase requisition is created and approved, detailing the required items.
Supplier Selection: Suitable suppliers are evaluated and selected based on criteria like price and quality.
Purchase Order: A formal purchase orde...
Creating duplicate reports and reconciling them involves identifying discrepancies and sending Requests for Information (RFIs) for clarification.
Identify Duplicates: Use data analysis tools to find duplicate entries in reports, such as comparing unique identifiers like IDs or timestamps.
Reconciliation Process: Compare the duplicate reports side by side to identify inconsistencies in data, such as mismatched values...
Cache is temporary storage for quick access, while persist refers to saving data permanently for long-term use.
Cache is volatile and loses data on power loss; persistence retains data even after shutdown.
Example of cache: CPU cache stores frequently accessed data for fast retrieval.
Example of persistence: Databases store user data permanently for future access.
Cache improves performance by reducing access time; pe...
What people are saying about IBM
Apache Spark is a distributed computing system designed for fast data processing and analytics across large datasets.
Spark operates on a cluster of machines, allowing parallel processing of data.
It uses Resilient Distributed Datasets (RDDs) for fault tolerance and efficient data manipulation.
Spark supports various programming languages, including Scala, Java, Python, and R.
It provides high-level APIs for SQL queri...
I follow a systematic approach to manage accounts payable efficiently, ensuring accuracy and timely payments.
Invoice Verification: I cross-check invoices against purchase orders and receipts to ensure accuracy.
Approval Workflow: I implement a structured approval process to prevent unauthorized payments.
Payment Scheduling: I prioritize payments based on due dates and vendor relationships to maintain good standing.
R...
Identifying bugs involves systematic testing, code reviews, and user feedback to ensure application quality.
Conduct thorough testing: Use unit tests, integration tests, and system tests to identify issues.
Perform code reviews: Collaborate with team members to catch potential bugs during the development phase.
Utilize automated testing tools: Tools like Selenium or JUnit can help identify bugs quickly and efficientl...
OOP concepts in Java include Encapsulation, Inheritance, Polymorphism, and Abstraction, forming the foundation of object-oriented programming.
Encapsulation: Bundling data and methods. Example: class with private variables and public getters/setters.
Inheritance: Mechanism to create a new class from an existing class. Example: class Dog extends Animal.
Polymorphism: Ability to take many forms. Example: method overrid...
Project delivery refers to the process of completing and handing over a project to stakeholders, ensuring all requirements are met.
Involves planning, execution, and closure phases of a project.
Ensures that project objectives align with stakeholder expectations.
Includes quality assurance to meet predefined standards.
Example: Delivering a software application after thorough testing.
Involves documentation and trainin...
BitLocker is a disk encryption feature in Windows that protects data by encrypting entire volumes.
Provides full disk encryption to protect data from unauthorized access.
Uses AES encryption algorithm to secure data.
Can be managed via Group Policy for enterprise environments.
Supports TPM (Trusted Platform Module) for enhanced security.
Allows recovery options through recovery keys or passwords.
WAN (Wide Area Network) connects multiple local networks over large distances, enabling communication and data sharing.
WANs cover large geographical areas, such as cities, countries, or even continents.
They use various transmission technologies, including leased lines, satellite links, and VPNs.
Examples of WANs include the Internet, corporate networks connecting multiple offices, and telecommunications networks.
LAN (Local Area Network) connects computers and devices in a limited area for resource sharing.
LAN typically covers a small geographic area, like a home, office, or campus.
Common technologies include Ethernet and Wi-Fi.
Devices on a LAN can share resources like printers and files.
LANs can be wired (using cables) or wireless (using Wi-Fi).
Example: A home network connecting computers, smartphones, and smart TVs.
Error 001 typically indicates a generic or unspecified error in a system, often requiring further investigation to diagnose.
Generic Error Code: Error 001 is often used as a placeholder for an unspecified error, indicating that something went wrong without specific details.
Troubleshooting Steps: To resolve Error 001, check system logs, review recent changes, and ensure all dependencies are correctly configured.
Common Co...
System32 is a critical Windows operating system directory containing essential system files and drivers.
Contains core system files necessary for Windows to operate.
Includes drivers for hardware components like printers and graphics cards.
Accessing System32 can lead to system configuration changes.
Deleting or modifying files in System32 can cause system instability.
Commonly referenced in jokes and memes about computer i...
BitLocker is a disk encryption feature in Windows that protects data by encrypting entire volumes.
Provides full disk encryption to protect data from unauthorized access.
Uses AES encryption algorithm to secure data.
Can be managed via Group Policy for enterprise environments.
Supports TPM (Trusted Platform Module) for enhanced security.
Allows recovery options through recovery keys or passwords.
I applied via Approached by Company and was interviewed in Oct 2024. There was 1 interview round.
High level item category is used at document level to group similar items together for easier tracking and reporting.
High level item category can be used to classify items based on their type, purpose, or department.
It helps in organizing and grouping items for better visibility and analysis.
For example, in a procurement document, high level item category can be used to group all office supplies together for easier tra...
The 17th step in pricing procedure is determining the final price based on all previous calculations and adjustments.
The 17th step involves taking into account all previous steps in the pricing procedure
It may involve applying discounts, taxes, and any other adjustments to arrive at the final price
This step is crucial in ensuring that the final price is accurate and competitive
Output determination involves configuring condition records, access sequences, and output types in SAP ERP system.
Define condition tables for output determination
Create access sequences to determine the sequence of condition tables
Assign condition records to access sequences
Configure output types and assign them to access sequences
Test output determination by creating sales orders or invoices
Master data tables for customer and material master are essential for storing detailed information about customers and materials.
Customer master table stores information about customers such as name, address, contact details, etc.
Material master table stores information about materials such as description, unit of measure, price, etc.
These tables are crucial for efficient data management and retrieval in a business sys...
Item categories for return orders, consignment processes, and their schedule lines
Return orders typically fall under categories like damaged goods, wrong item received, or change of mind
Consignment processes may involve categories such as delivery scheduling, inventory management, and payment terms
Schedule lines for return orders and consignment processes help track timelines for actions and deliveries
The golden rule of access sequence determines the order in which system accesses condition records in SAP.
Access sequences are used in SAP to determine the order in which condition records are accessed during pricing determination
The golden rule states that the system will access condition records in the order they are defined in the access sequence
If a condition record is found in an earlier step of the access sequenc...
Tax configuration should be placed at the end of the pricing procedure to ensure accurate calculations.
Tax configuration should be placed after all other conditions and calculations in the pricing procedure.
This ensures that taxes are calculated on the final price after all discounts and surcharges have been applied.
Placing tax configuration at the end helps in avoiding any discrepancies in tax calculations.
Example: Co...
Standard orders have regular delivery times while rush orders require immediate delivery. Controls for rush orders are typically set in the system.
Standard orders have regular delivery times based on the company's standard processing and shipping times.
Rush orders are prioritized for immediate delivery, often with expedited processing and shipping.
Controls for rush orders are usually set in the system, such as flagging...
Basic coding and advanced topics of handling scenario
The SAP T code for vendors creation is XK01.
Use transaction code XK01 in SAP to create a new vendor
Enter the necessary details such as vendor name, address, payment terms, etc.
Save the vendor information once all details are entered
Case studies will be provided
I applied via Job Portal and was interviewed in Nov 2024. There were 2 interview rounds.
I have three questions: 1. How to handle null values? 2. What are ranking functions? 3. Can you explain self joins?
I primarily use tools such as Microsoft Excel, PowerPoint, and Tableau for data analysis and visualization.
Microsoft Excel for data manipulation and analysis
PowerPoint for creating presentations
Tableau for data visualization
I can join within two weeks of receiving an offer.
I can start within two weeks of receiving an offer.
I need to give notice at my current job before starting.
I have some personal commitments that I need to wrap up before joining.
I applied via Recruitment Consulltant and was interviewed in Nov 2024. There was 1 interview round.
Using sliding window technique to find subarray with sum equal to k.
Initialize two pointers at the start of the array.
Move the right pointer to expand the window until the sum is greater than or equal to k.
Move the left pointer to shrink the window if the sum exceeds k.
Repeat until the end of the array is reached.
Example: Input array [1, 4, 20, 3, 10, 5], k=33. Output: [20, 3, 10].
I applied via Naukri.com and was interviewed in Aug 2024. There were 4 interview rounds.
Kindly arrange the aptitude test is Online mode
Currently managing multiple projects with varying deadlines and priorities.
Balancing workload by prioritizing tasks based on deadlines and importance
Utilizing project management tools to track progress and allocate resources efficiently
Communicating with team members and stakeholders to ensure alignment on project goals and timelines
Metting with top management
Some of the top questions asked at the IBM interview for experienced candidates -
The duration of IBM interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 480 interview experiences
Difficulty level
Duration
based on 23.6k reviews
Rating in categories
Application Developer
12.6k
salaries
| ₹5.4 L/yr - ₹26.6 L/yr |
Software Engineer
5.9k
salaries
| ₹8.3 L/yr - ₹24.9 L/yr |
Software Developer
5.7k
salaries
| ₹13.4 L/yr - ₹39.7 L/yr |
Senior Software Engineer
5.3k
salaries
| ₹14.1 L/yr - ₹30 L/yr |
Advisory System Analyst
4.5k
salaries
| ₹13.6 L/yr - ₹23 L/yr |
Oracle
TCS
Cognizant
Accenture