i
IBM
Proud winner of ABECA 2025 - AmbitionBox Employee Choice Awards
Filter interviews by
TCP is connection-oriented, reliable, and slower, while UDP is connectionless, unreliable, and faster.
TCP is connection-oriented, meaning a connection is established before data transfer, ensuring reliability.
UDP is connectionless, meaning data is sent without establishing a connection, making it faster but less reliable.
TCP uses a three-way handshake for connection establishment, while UDP does not have a handsha...
Primary key uniquely identifies each record in a table, while foreign key establishes a link between two tables.
Primary key ensures data integrity by enforcing uniqueness of each record
Foreign key establishes a relationship between tables by referencing the primary key of another table
Primary key can be a single column or a combination of columns
Foreign key helps maintain referential integrity in a database
I am a financial analyst with expertise in P2P, accounting principles, and invoice processing.
P2P stands for Procure-to-Pay, which is the process of requisitioning, purchasing, receiving, paying for, and accounting for goods and services.
The golden rule of accounting states that debit what comes in and credit what goes out.
Accounts payable is the amount a company owes to its suppliers or vendors for goods or servi...
Design thinking is a problem-solving approach that focuses on understanding the user's needs and creating innovative solutions.
Design thinking involves empathizing with the user, defining the problem, ideating solutions, prototyping, and testing.
I have implemented design thinking in a project where we conducted user interviews to understand their pain points and then brainstormed creative solutions.
By following th...
What people are saying about IBM
I have knowledge on patching Windows servers and different types of servers.
I am familiar with the process of patching Windows servers to ensure they are up to date with the latest security updates and bug fixes.
I am aware of different types of Windows servers such as file servers, web servers, domain controllers, and application servers.
I understand the importance of regularly patching servers to protect against ...
SOF stands for Statement of Work, which outlines the scope, deliverables, and timeline of a project. SOW stands for Scope of Work, which details the specific tasks and responsibilities of a project.
SOF focuses on the overall project objectives and outcomes
SOW breaks down the project into specific tasks and responsibilities
SOF is usually more high-level and strategic
SOW is more detailed and operational
Example: SOF ...
SAP MM is a module that deals with material management. Purchase order is a document used to procure goods or services. Subcontracting vendor is a vendor who provides goods or services to a company. Movement types are used in sub-contracting to track the movement of goods. Physical inventory is a process of counting and verifying the inventory on hand.
SAP MM deals with material management
Purchase order is a docume...
To restrict URL access in Angular, use Angular Router Guards.
Angular Router Guards can be used to restrict access to certain routes based on user authentication or authorization.
There are three types of guards: CanActivate, CanActivateChild, and CanLoad.
CanActivate is used to prevent access to a route, CanActivateChild is used to prevent access to child routes, and CanLoad is used to prevent lazy-loaded modules fr...
Interceptors are functions that can intercept and modify requests or responses in an application. Closures are functions that have access to variables in their outer scope.
Interceptors can be used for logging, authentication, caching, and more.
Closures are commonly used in JavaScript to create private variables and functions.
An example of an interceptor in AngularJS is the $httpInterceptor service.
An example of a ...
Questions on big data, Hadoop, Spark, Scala, Git, project and Agile.
Hadoop architecture and HDFS commands for copying and listing files in HDFS
Spark architecture and Transformation and Action question
What happens when we submit a Spark program
Spark DataFrame coding question
Scala basic program on List
Git and Github
Project-related question
Agile-related
I appeared for an interview in May 2025, where I was asked the following questions.
I appeared for an interview in Jun 2023, where I was asked the following questions.
WAN (Wide Area Network) connects multiple local networks over large distances, enabling communication and data sharing.
WANs cover large geographical areas, such as cities, countries, or even continents.
They use various transmission technologies, including leased lines, satellite links, and VPNs.
Examples of WANs include the Internet, corporate networks connecting multiple offices, and telecommunications networks.
LAN (Local Area Network) connects computers and devices in a limited area for resource sharing.
LAN typically covers a small geographic area, like a home, office, or campus.
Common technologies include Ethernet and Wi-Fi.
Devices on a LAN can share resources like printers and files.
LANs can be wired (using cables) or wireless (using Wi-Fi).
Example: A home network connecting computers, smartphones, and smart TVs.
Error 001 typically indicates a generic or unspecified error in a system, often requiring further investigation to diagnose.
Generic Error Code: Error 001 is often used as a placeholder for an unspecified error, indicating that something went wrong without specific details.
Troubleshooting Steps: To resolve Error 001, check system logs, review recent changes, and ensure all dependencies are correctly configured.
Common Co...
System32 is a critical Windows operating system directory containing essential system files and drivers.
Contains core system files necessary for Windows to operate.
Includes drivers for hardware components like printers and graphics cards.
Accessing System32 can lead to system configuration changes.
Deleting or modifying files in System32 can cause system instability.
Commonly referenced in jokes and memes about computer i...
BitLocker is a disk encryption feature in Windows that protects data by encrypting entire volumes.
Provides full disk encryption to protect data from unauthorized access.
Uses AES encryption algorithm to secure data.
Can be managed via Group Policy for enterprise environments.
Supports TPM (Trusted Platform Module) for enhanced security.
Allows recovery options through recovery keys or passwords.
I applied via Approached by Company and was interviewed in Oct 2024. There was 1 interview round.
High level item category is used at document level to group similar items together for easier tracking and reporting.
High level item category can be used to classify items based on their type, purpose, or department.
It helps in organizing and grouping items for better visibility and analysis.
For example, in a procurement document, high level item category can be used to group all office supplies together for easier tra...
The 17th step in pricing procedure is determining the final price based on all previous calculations and adjustments.
The 17th step involves taking into account all previous steps in the pricing procedure
It may involve applying discounts, taxes, and any other adjustments to arrive at the final price
This step is crucial in ensuring that the final price is accurate and competitive
Output determination involves configuring condition records, access sequences, and output types in SAP ERP system.
Define condition tables for output determination
Create access sequences to determine the sequence of condition tables
Assign condition records to access sequences
Configure output types and assign them to access sequences
Test output determination by creating sales orders or invoices
Master data tables for customer and material master are essential for storing detailed information about customers and materials.
Customer master table stores information about customers such as name, address, contact details, etc.
Material master table stores information about materials such as description, unit of measure, price, etc.
These tables are crucial for efficient data management and retrieval in a business sys...
Item categories for return orders, consignment processes, and their schedule lines
Return orders typically fall under categories like damaged goods, wrong item received, or change of mind
Consignment processes may involve categories such as delivery scheduling, inventory management, and payment terms
Schedule lines for return orders and consignment processes help track timelines for actions and deliveries
The golden rule of access sequence determines the order in which system accesses condition records in SAP.
Access sequences are used in SAP to determine the order in which condition records are accessed during pricing determination
The golden rule states that the system will access condition records in the order they are defined in the access sequence
If a condition record is found in an earlier step of the access sequenc...
Tax configuration should be placed at the end of the pricing procedure to ensure accurate calculations.
Tax configuration should be placed after all other conditions and calculations in the pricing procedure.
This ensures that taxes are calculated on the final price after all discounts and surcharges have been applied.
Placing tax configuration at the end helps in avoiding any discrepancies in tax calculations.
Example: Co...
Standard orders have regular delivery times while rush orders require immediate delivery. Controls for rush orders are typically set in the system.
Standard orders have regular delivery times based on the company's standard processing and shipping times.
Rush orders are prioritized for immediate delivery, often with expedited processing and shipping.
Controls for rush orders are usually set in the system, such as flagging...
Basic coding and advanced topics of handling scenario
The SAP T code for vendors creation is XK01.
Use transaction code XK01 in SAP to create a new vendor
Enter the necessary details such as vendor name, address, payment terms, etc.
Save the vendor information once all details are entered
Case studies will be provided
I applied via Job Portal and was interviewed in Nov 2024. There were 2 interview rounds.
I have three questions: 1. How to handle null values? 2. What are ranking functions? 3. Can you explain self joins?
I primarily use tools such as Microsoft Excel, PowerPoint, and Tableau for data analysis and visualization.
Microsoft Excel for data manipulation and analysis
PowerPoint for creating presentations
Tableau for data visualization
I can join within two weeks of receiving an offer.
I can start within two weeks of receiving an offer.
I need to give notice at my current job before starting.
I have some personal commitments that I need to wrap up before joining.
Some of the top questions asked at the IBM interview for experienced candidates -
The duration of IBM interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 479 interview experiences
Difficulty level
Duration
based on 23.5k reviews
Rating in categories
Bangalore / Bengaluru
3-8 Yrs
₹ 2.9-7.5 LPA
Bangalore / Bengaluru
0-1 Yrs
₹ 3-5.1 LPA
Application Developer
12.5k
salaries
| ₹5.1 L/yr - ₹26.3 L/yr |
Software Engineer
5.9k
salaries
| ₹8.2 L/yr - ₹26.1 L/yr |
Software Developer
5.7k
salaries
| ₹13.7 L/yr - ₹35.2 L/yr |
Senior Software Engineer
5.4k
salaries
| ₹14.1 L/yr - ₹36 L/yr |
Advisory System Analyst
5.2k
salaries
| ₹9.5 L/yr - ₹27 L/yr |
Oracle
TCS
Cognizant
Accenture