i
IBM
Proud winner of ABECA 2025 - AmbitionBox Employee Choice Awards
Filter interviews by
Hashmap is a data structure that stores key-value pairs and uses hashing to retrieve values quickly.
Hashmap uses an array to store the key-value pairs
The key is hashed to generate an index in the array
If two keys hash to the same index, a linked list is used to store the values
Hashmap provides constant time complexity for insertion, deletion, and retrieval
Java's Hashmap implementation uses a load factor to determi...
The @Qualifier annotation is used in Spring to resolve ambiguity when multiple beans of the same type are present.
It is used to specify which bean should be autowired when multiple beans of the same type are present
It can be used with constructor injection, setter injection, and field injection
It is commonly used in conjunction with @Autowired annotation
Example: @Qualifier("myBean")
Spring Boot is a framework that simplifies the configuration and deployment of Spring-based applications.
Spring Boot provides a pre-configured environment for building and running Spring applications.
It eliminates the need for XML configuration files and reduces boilerplate code.
It includes an embedded web server and supports various data sources and messaging systems.
Example: Spring Boot can be used to quickly cr...
jdbctemplate is a class in Spring Framework that simplifies the use of JDBC while handling exceptions and boilerplate code.
It is used to perform database operations such as querying, updating, and deleting data.
It provides methods for executing SQL statements and mapping results to Java objects.
It handles exceptions and releases resources automatically.
Example: jdbcTemplate.queryForObject("SELECT COUNT(*) FROM use...
What people are saying about IBM
Marker interfaces are interfaces with no methods, used to mark a class as having a certain property or behavior.
Marker interfaces are used to provide metadata about a class.
They are used to indicate that a class implements a certain behavior or has a certain property.
Examples include Serializable, Cloneable, and Remote interfaces in Java.
Marker interfaces can also be used to trigger specific behavior in frameworks...
Creating an immutable class involves making the class and its fields final and not providing any setters.
Make the class final so it cannot be extended
Make all fields final so they cannot be changed
Do not provide any setters, only getters
If mutable objects are used in the class, return copies of them in getters
BDD Cucumber is a testing framework that uses natural language to describe test scenarios. Background is used to define common steps for scenarios.
BDD Cucumber is a behavior-driven development framework
It uses Gherkin syntax to write test scenarios in natural language
Background is used to define common steps for scenarios
It helps in reducing code duplication and makes scenarios more readable
Example: Background can...
Application monitoring is done through various tools and configurations.
We use tools like Nagios, Zabbix, and Prometheus for monitoring.
We configure alerts for critical events and set up dashboards for easy visualization.
We also use log aggregation tools like ELK stack to monitor application logs.
We monitor system resources like CPU, memory, and disk usage.
We perform load testing to identify performance bottleneck...
API error codes are numerical or alphanumeric codes that indicate an error occurred during API usage.
Error codes help developers identify and troubleshoot issues with API requests and responses.
Common error codes include 400 Bad Request, 401 Unauthorized, 404 Not Found, and 500 Internal Server Error.
API providers may also create custom error codes specific to their API.
Error codes may be accompanied by error messa...
Comp and Comp-3 are two different data types used in Mainframe systems.
Comp is a binary data type that uses one byte for each digit and can store positive and negative numbers.
Comp-3 is a packed decimal data type that uses half a byte for each digit and can store only positive numbers.
Comp is faster than Comp-3 but takes up more space.
Comp-3 is more space-efficient but slower than Comp.
Comp is used for arithmetic ...
WAN (Wide Area Network) connects multiple local networks over large distances, enabling communication and data sharing.
WANs cover large geographical areas, such as cities, countries, or even continents.
They use various transmission technologies, including leased lines, satellite links, and VPNs.
Examples of WANs include the Internet, corporate networks connecting multiple offices, and telecommunications networks.
LAN (Local Area Network) connects computers and devices in a limited area for resource sharing.
LAN typically covers a small geographic area, like a home, office, or campus.
Common technologies include Ethernet and Wi-Fi.
Devices on a LAN can share resources like printers and files.
LANs can be wired (using cables) or wireless (using Wi-Fi).
Example: A home network connecting computers, smartphones, and smart TVs.
Error 001 typically indicates a generic or unspecified error in a system, often requiring further investigation to diagnose.
Generic Error Code: Error 001 is often used as a placeholder for an unspecified error, indicating that something went wrong without specific details.
Troubleshooting Steps: To resolve Error 001, check system logs, review recent changes, and ensure all dependencies are correctly configured.
Common Co...
System32 is a critical Windows operating system directory containing essential system files and drivers.
Contains core system files necessary for Windows to operate.
Includes drivers for hardware components like printers and graphics cards.
Accessing System32 can lead to system configuration changes.
Deleting or modifying files in System32 can cause system instability.
Commonly referenced in jokes and memes about computer i...
BitLocker is a disk encryption feature in Windows that protects data by encrypting entire volumes.
Provides full disk encryption to protect data from unauthorized access.
Uses AES encryption algorithm to secure data.
Can be managed via Group Policy for enterprise environments.
Supports TPM (Trusted Platform Module) for enhanced security.
Allows recovery options through recovery keys or passwords.
I applied via Approached by Company and was interviewed in Oct 2024. There was 1 interview round.
High level item category is used at document level to group similar items together for easier tracking and reporting.
High level item category can be used to classify items based on their type, purpose, or department.
It helps in organizing and grouping items for better visibility and analysis.
For example, in a procurement document, high level item category can be used to group all office supplies together for easier tra...
The 17th step in pricing procedure is determining the final price based on all previous calculations and adjustments.
The 17th step involves taking into account all previous steps in the pricing procedure
It may involve applying discounts, taxes, and any other adjustments to arrive at the final price
This step is crucial in ensuring that the final price is accurate and competitive
Output determination involves configuring condition records, access sequences, and output types in SAP ERP system.
Define condition tables for output determination
Create access sequences to determine the sequence of condition tables
Assign condition records to access sequences
Configure output types and assign them to access sequences
Test output determination by creating sales orders or invoices
Master data tables for customer and material master are essential for storing detailed information about customers and materials.
Customer master table stores information about customers such as name, address, contact details, etc.
Material master table stores information about materials such as description, unit of measure, price, etc.
These tables are crucial for efficient data management and retrieval in a business sys...
Item categories for return orders, consignment processes, and their schedule lines
Return orders typically fall under categories like damaged goods, wrong item received, or change of mind
Consignment processes may involve categories such as delivery scheduling, inventory management, and payment terms
Schedule lines for return orders and consignment processes help track timelines for actions and deliveries
The golden rule of access sequence determines the order in which system accesses condition records in SAP.
Access sequences are used in SAP to determine the order in which condition records are accessed during pricing determination
The golden rule states that the system will access condition records in the order they are defined in the access sequence
If a condition record is found in an earlier step of the access sequenc...
Tax configuration should be placed at the end of the pricing procedure to ensure accurate calculations.
Tax configuration should be placed after all other conditions and calculations in the pricing procedure.
This ensures that taxes are calculated on the final price after all discounts and surcharges have been applied.
Placing tax configuration at the end helps in avoiding any discrepancies in tax calculations.
Example: Co...
Standard orders have regular delivery times while rush orders require immediate delivery. Controls for rush orders are typically set in the system.
Standard orders have regular delivery times based on the company's standard processing and shipping times.
Rush orders are prioritized for immediate delivery, often with expedited processing and shipping.
Controls for rush orders are usually set in the system, such as flagging...
Basic coding and advanced topics of handling scenario
The SAP T code for vendors creation is XK01.
Use transaction code XK01 in SAP to create a new vendor
Enter the necessary details such as vendor name, address, payment terms, etc.
Save the vendor information once all details are entered
Case studies will be provided
I applied via Job Portal and was interviewed in Nov 2024. There were 2 interview rounds.
I have three questions: 1. How to handle null values? 2. What are ranking functions? 3. Can you explain self joins?
I primarily use tools such as Microsoft Excel, PowerPoint, and Tableau for data analysis and visualization.
Microsoft Excel for data manipulation and analysis
PowerPoint for creating presentations
Tableau for data visualization
I can join within two weeks of receiving an offer.
I can start within two weeks of receiving an offer.
I need to give notice at my current job before starting.
I have some personal commitments that I need to wrap up before joining.
I applied via Recruitment Consulltant and was interviewed in Nov 2024. There was 1 interview round.
Using sliding window technique to find subarray with sum equal to k.
Initialize two pointers at the start of the array.
Move the right pointer to expand the window until the sum is greater than or equal to k.
Move the left pointer to shrink the window if the sum exceeds k.
Repeat until the end of the array is reached.
Example: Input array [1, 4, 20, 3, 10, 5], k=33. Output: [20, 3, 10].
I applied via Naukri.com and was interviewed in Aug 2024. There were 4 interview rounds.
Kindly arrange the aptitude test is Online mode
Currently managing multiple projects with varying deadlines and priorities.
Balancing workload by prioritizing tasks based on deadlines and importance
Utilizing project management tools to track progress and allocate resources efficiently
Communicating with team members and stakeholders to ensure alignment on project goals and timelines
Metting with top management
Some of the top questions asked at the IBM interview for experienced candidates -
The duration of IBM interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 480 interview experiences
Difficulty level
Duration
based on 23.6k reviews
Rating in categories
Application Developer
12.6k
salaries
| ₹5.2 L/yr - ₹26.5 L/yr |
Software Engineer
5.9k
salaries
| ₹8.2 L/yr - ₹24.8 L/yr |
Software Developer
5.7k
salaries
| ₹13.3 L/yr - ₹39.6 L/yr |
Senior Software Engineer
5.3k
salaries
| ₹14.2 L/yr - ₹30 L/yr |
Advisory System Analyst
4.5k
salaries
| ₹13.6 L/yr - ₹23 L/yr |
Oracle
TCS
Cognizant
Accenture