i
IBM
Proud winner of ABECA 2025 - AmbitionBox Employee Choice Awards
Filter interviews by
C is a programming language used for system programming, embedded systems, and game development.
C was developed by Dennis Ritchie at Bell Labs in 1972.
It is a compiled language, meaning that the code is translated into machine-readable instructions before execution.
C is known for its efficiency and low-level control over hardware, making it a popular choice for operating systems and device drivers.
C functions are ...
Answering questions on RAC architecture, startup and shutdown process, spfile and ASM migration
RAC architecture involves multiple nodes sharing a common storage and network infrastructure
Startup process involves starting the Oracle Clusterware stack, starting the database instances, and mounting the database
Shutdown process involves dismounting the database, stopping the database instances, and stopping the Oracle...
Answering questions related to /etc/fstab fields and lvextend command.
Fields in /etc/fstab are device, mount point, file system type, options, dump frequency and file system check order
Using 'l' instead of 'L' in lvextend command will result in an error as 'l' is not a valid option
lvextend command is used to extend the size of a logical volume
The /etc/fstab file is used to define how file systems are mounted and a...
Non-functional requirements are handled by considering various factors and capacity planning is done by analyzing current and future needs.
Identify and prioritize non-functional requirements
Analyze the impact of non-functional requirements on the system
Design and implement solutions to meet non-functional requirements
Perform capacity planning by considering current and future needs
Monitor system performance and ma...
What people are saying about IBM
Multithreading in Java allows multiple threads to execute concurrently, improving performance and responsiveness.
Multithreading in Java is achieved by extending the Thread class or implementing the Runnable interface.
Threads share the same memory space, allowing them to communicate and synchronize using methods like wait(), notify(), and notifyAll().
Java provides high-level concurrency utilities like Executors, Th...
DNS is a system that translates domain names into IP addresses. DHCP is a protocol for assigning IP addresses. IP address is a unique identifier for devices. RJ-45 is a type of connector used for Ethernet cables.
DNS translates domain names (e.g., www.example.com) into IP addresses (e.g., 192.168.1.1).
DHCP is a protocol that automatically assigns IP addresses to devices on a network.
An IP address is a numerical lab...
Tcodes in SAP are transaction codes that allow users to access specific functions and screens within the SAP system.
Tcodes are unique identifiers for transactions in SAP, e.g., 'VA01' for creating sales orders.
They streamline navigation by allowing direct access to functions without going through menus.
Commonly used tcodes include 'ME21N' for creating purchase orders and 'FB50' for general ledger postings.
Users ca...
Salesforce Admins manage user access, data security, and automate processes using flows to enhance business operations.
User Management: Salesforce Admins create and manage user accounts, assigning roles and profiles to control access to data.
Data Security: Admins implement security measures like field-level security, sharing rules, and permission sets to protect sensitive information.
Automation with Flows: Salesfo...
Window functions in SQL allow for performing calculations across a set of table rows related to the current row.
Window functions operate on a set of rows defined by an OVER() clause.
They do not change the number of rows returned by a query.
Common window functions include ROW_NUMBER(), RANK(), and SUM().
Example: SELECT name, salary, RANK() OVER (ORDER BY salary DESC) AS rank FROM employees;
Window functions can be p...
Two-way and three-way matching are procurement processes ensuring accuracy in invoices and payments.
Two-way matching involves comparing the purchase order and the invoice.
Example: If a company orders 100 units of a product, the invoice should reflect that quantity.
Three-way matching adds a third document, the receiving report, to the comparison.
Example: In three-way matching, the purchase order, invoice, and deliv...
I appeared for an interview in May 2025, where I was asked the following questions.
I appeared for an interview in Jun 2023, where I was asked the following questions.
WAN (Wide Area Network) connects multiple local networks over large distances, enabling communication and data sharing.
WANs cover large geographical areas, such as cities, countries, or even continents.
They use various transmission technologies, including leased lines, satellite links, and VPNs.
Examples of WANs include the Internet, corporate networks connecting multiple offices, and telecommunications networks.
LAN (Local Area Network) connects computers and devices in a limited area for resource sharing.
LAN typically covers a small geographic area, like a home, office, or campus.
Common technologies include Ethernet and Wi-Fi.
Devices on a LAN can share resources like printers and files.
LANs can be wired (using cables) or wireless (using Wi-Fi).
Example: A home network connecting computers, smartphones, and smart TVs.
Error 001 typically indicates a generic or unspecified error in a system, often requiring further investigation to diagnose.
Generic Error Code: Error 001 is often used as a placeholder for an unspecified error, indicating that something went wrong without specific details.
Troubleshooting Steps: To resolve Error 001, check system logs, review recent changes, and ensure all dependencies are correctly configured.
Common Co...
System32 is a critical Windows operating system directory containing essential system files and drivers.
Contains core system files necessary for Windows to operate.
Includes drivers for hardware components like printers and graphics cards.
Accessing System32 can lead to system configuration changes.
Deleting or modifying files in System32 can cause system instability.
Commonly referenced in jokes and memes about computer i...
BitLocker is a disk encryption feature in Windows that protects data by encrypting entire volumes.
Provides full disk encryption to protect data from unauthorized access.
Uses AES encryption algorithm to secure data.
Can be managed via Group Policy for enterprise environments.
Supports TPM (Trusted Platform Module) for enhanced security.
Allows recovery options through recovery keys or passwords.
I applied via Approached by Company and was interviewed in Oct 2024. There was 1 interview round.
High level item category is used at document level to group similar items together for easier tracking and reporting.
High level item category can be used to classify items based on their type, purpose, or department.
It helps in organizing and grouping items for better visibility and analysis.
For example, in a procurement document, high level item category can be used to group all office supplies together for easier tra...
The 17th step in pricing procedure is determining the final price based on all previous calculations and adjustments.
The 17th step involves taking into account all previous steps in the pricing procedure
It may involve applying discounts, taxes, and any other adjustments to arrive at the final price
This step is crucial in ensuring that the final price is accurate and competitive
Output determination involves configuring condition records, access sequences, and output types in SAP ERP system.
Define condition tables for output determination
Create access sequences to determine the sequence of condition tables
Assign condition records to access sequences
Configure output types and assign them to access sequences
Test output determination by creating sales orders or invoices
Master data tables for customer and material master are essential for storing detailed information about customers and materials.
Customer master table stores information about customers such as name, address, contact details, etc.
Material master table stores information about materials such as description, unit of measure, price, etc.
These tables are crucial for efficient data management and retrieval in a business sys...
Item categories for return orders, consignment processes, and their schedule lines
Return orders typically fall under categories like damaged goods, wrong item received, or change of mind
Consignment processes may involve categories such as delivery scheduling, inventory management, and payment terms
Schedule lines for return orders and consignment processes help track timelines for actions and deliveries
The golden rule of access sequence determines the order in which system accesses condition records in SAP.
Access sequences are used in SAP to determine the order in which condition records are accessed during pricing determination
The golden rule states that the system will access condition records in the order they are defined in the access sequence
If a condition record is found in an earlier step of the access sequenc...
Tax configuration should be placed at the end of the pricing procedure to ensure accurate calculations.
Tax configuration should be placed after all other conditions and calculations in the pricing procedure.
This ensures that taxes are calculated on the final price after all discounts and surcharges have been applied.
Placing tax configuration at the end helps in avoiding any discrepancies in tax calculations.
Example: Co...
Standard orders have regular delivery times while rush orders require immediate delivery. Controls for rush orders are typically set in the system.
Standard orders have regular delivery times based on the company's standard processing and shipping times.
Rush orders are prioritized for immediate delivery, often with expedited processing and shipping.
Controls for rush orders are usually set in the system, such as flagging...
Basic coding and advanced topics of handling scenario
The SAP T code for vendors creation is XK01.
Use transaction code XK01 in SAP to create a new vendor
Enter the necessary details such as vendor name, address, payment terms, etc.
Save the vendor information once all details are entered
I appeared for an interview before Jun 2024, where I was asked the following questions.
Case studies will be provided
I applied via Job Portal and was interviewed in Nov 2024. There were 2 interview rounds.
I have three questions: 1. How to handle null values? 2. What are ranking functions? 3. Can you explain self joins?
I primarily use tools such as Microsoft Excel, PowerPoint, and Tableau for data analysis and visualization.
Microsoft Excel for data manipulation and analysis
PowerPoint for creating presentations
Tableau for data visualization
Some of the top questions asked at the IBM interview for experienced candidates -
The duration of IBM interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 480 interview experiences
Difficulty level
Duration
based on 23.6k reviews
Rating in categories
Bangalore / Bengaluru
3-8 Yrs
₹ 2.9-7.5 LPA
Bangalore / Bengaluru
0-1 Yrs
₹ 3-5.1 LPA
Application Developer
12.5k
salaries
| ₹5.2 L/yr - ₹26.4 L/yr |
Software Engineer
5.9k
salaries
| ₹8.2 L/yr - ₹26.2 L/yr |
Software Developer
5.7k
salaries
| ₹13.4 L/yr - ₹42.8 L/yr |
Senior Software Engineer
5.4k
salaries
| ₹14.1 L/yr - ₹36 L/yr |
Advisory System Analyst
4.5k
salaries
| ₹9.6 L/yr - ₹27 L/yr |
Oracle
TCS
Cognizant
Accenture