Add office photos
Engaged Employer

IBM

4.0
based on 21.5k Reviews
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

400+ FOX Solutions Interview Questions and Answers

Updated 29 Dec 2024
Popular Designations

Q1. what is comp & comp 3 differance ?

Ans.

COMP and COMP-3 are data types used in COBOL programming language.

  • COMP is a binary data type that stores numeric values as binary integers.

  • COMP-3 is a packed decimal data type that stores numeric values as packed decimal digits.

  • COMP uses less storage space compared to COMP-3.

  • COMP-3 is more suitable for decimal arithmetic operations.

  • COMP-3 values are stored in a packed format, where each digit occupies half a byte.

  • COMP-3 values can represent both positive and negative numbers.

View 12 more answers

Q2. we have 2 files eliminate duplicates and send to duplicate files in to another out put file how to achieve it ?

Ans.

To eliminate duplicates from 2 files and send them to another output file, we can use a combination of file reading, hashing, and file writing.

  • Read the contents of both files and store them in separate arrays or lists.

  • Create a hash table or dictionary to keep track of the unique elements in the arrays.

  • Iterate through the arrays and add each element to the hash table. If the element already exists, skip it.

  • Write the contents of the hash table to the output file.

  • If needed, writ...read more

View 4 more answers

Q3. What is inheritance and what are their types? Explain them.

Ans.

Inheritance is a mechanism in object-oriented programming where a new class is derived from an existing class.

  • It allows the new class to inherit the properties and methods of the existing class.

  • There are two types of inheritance: single and multiple.

  • Single inheritance is when a class inherits from only one parent class.

  • Multiple inheritance is when a class inherits from multiple parent classes.

  • For example, a class 'Car' can inherit from a parent class 'Vehicle' which has prope...read more

View 1 answer

Q4. how to check file is empty or not ?

Ans.

To check if a file is empty or not, we can use the file's size or read the file and check for any content.

  • Get the size of the file using file system APIs and check if it is zero.

  • Read the file and check if it contains any content.

  • Handle exceptions or errors that may occur during file operations.

View 2 more answers
Discover FOX Solutions interview dos and don'ts from real experiences

Q5. What are the detail that you will share to the supplier for getting a quote.?

Ans.

The details to share with the supplier for a quote

  • Product specifications

  • Quantity required

  • Delivery timeline

  • Quality standards

  • Payment terms

  • Any specific packaging or labeling requirements

  • Any applicable certifications or regulatory compliance

  • Expected pricing or budget constraints

View 1 answer

Q6. 1) How to handle data skewness in spark.

Ans.

Data skewness in Spark can be handled by partitioning, bucketing, or using salting techniques.

  • Partitioning the data based on a key column can distribute the data evenly across the nodes.

  • Bucketing can group the data into buckets based on a key column, which can improve join performance.

  • Salting involves adding a random prefix to the key column, which can distribute the data evenly.

  • Using broadcast joins for small tables can also help in reducing skewness.

  • Using dynamic allocation...read more

View 4 more answers
Are these interview questions helpful?

Q7. how many ways data pass jcl to cobol program ?

Ans.

Data can pass from JCL to COBOL program in multiple ways, such as through input files, system symbols, and program parameters.

  • Input files: Data can be passed to a COBOL program through input files specified in the JCL.

  • System symbols: JCL can define system symbols that can be accessed by the COBOL program to retrieve data.

  • Program parameters: JCL can pass parameters to the COBOL program, which can be used to receive data.

  • Environment variables: JCL can set environment variables ...read more

View 3 more answers

Q8. What do you know about Ariba, how ariba is different from other Procurement Tools.?

Ans.

Ariba is a procurement tool that offers a comprehensive suite of solutions for procurement processes.

  • Ariba provides end-to-end procurement solutions, including sourcing, contract management, supplier management, and procurement analytics.

  • It offers a cloud-based platform that allows for easy collaboration between buyers and suppliers.

  • Ariba's network connects millions of buyers and suppliers globally, enabling efficient procurement processes.

  • The tool provides real-time visibili...read more

View 1 answer
Share interview questions and help millions of jobseekers 🌟

Q9. how to get distinct data without using distinct keyword

Ans.

To get distinct data without using distinct keyword, use GROUP BY clause.

  • Use GROUP BY clause with the column name to group the data by that column.

  • Use aggregate functions like COUNT, SUM, AVG, etc. to get the desired result.

  • Example: SELECT column_name FROM table_name GROUP BY column_name;

  • Example: SELECT column_name, COUNT(*) FROM table_name GROUP BY column_name;

Add your answer

Q10. What are polymorphism, abstraction, and encapsulation?

Ans.

Polymorphism, abstraction, and encapsulation are three fundamental concepts in object-oriented programming.

  • Polymorphism allows objects of different classes to be treated as if they are objects of the same class.

  • Abstraction is the process of hiding complex implementation details and showing only the necessary information to the user.

  • Encapsulation is the practice of keeping the internal workings of an object hidden from the outside world.

  • Examples of polymorphism include method ...read more

Add your answer

Q11. How to manage clients, how to handle critical issues with example

Ans.

Managing clients and handling critical issues

  • Establish clear communication channels with clients

  • Set realistic expectations and manage client's expectations

  • Proactively identify and address potential issues

  • Provide timely updates and resolutions

  • Maintain a positive and professional attitude

  • Document and learn from critical issues for future improvement

View 2 more answers

Q12. Stages of AML, types of alerts in transaction monitoring, sanctions

Ans.

The stages of AML include customer identification, transaction monitoring, and reporting. Types of alerts in transaction monitoring include high-risk transactions, unusual activity, and potential money laundering. Sanctions refer to restrictions imposed on individuals or entities by governments or international organizations.

  • Stages of AML: customer identification, transaction monitoring, reporting

  • Types of alerts in transaction monitoring: high-risk transactions, unusual activ...read more

View 5 more answers

Q13. how to data insert or update in table ?

Ans.

To insert or update data in a table, use SQL statements like INSERT INTO or UPDATE.

  • For inserting data, use the INSERT INTO statement followed by the table name and column names.

  • Specify the values to be inserted using the VALUES keyword.

  • For updating data, use the UPDATE statement followed by the table name.

  • Set the column values to be updated using the SET keyword.

  • Use conditions with the WHERE clause to specify which rows to update.

View 2 more answers

Q14. what is array ? how to load data ?

Ans.

An array is a data structure that stores a collection of elements of the same type.

  • Arrays can be used to store and access multiple values using a single variable.

  • To load data into an array of strings, you can assign values to each element individually or use a loop.

  • Example: String[] names = {"John", "Jane", "Mike"};

  • Example: for(int i = 0; i < names.length; i++) { names[i] = "Value" + i; }

View 3 more answers

Q15. In C# --&gt; Abstraction, Interface , Abstract Method, Abstract Class, Polymorphisms, Encapsulation ,Inheritance, Serialization,

Ans.

C# concepts including abstraction, interface, abstract method, abstract class, polymorphism, encapsulation, inheritance, and serialization.

  • Abstraction: hiding implementation details

  • Interface: defining a contract for behavior

  • Abstract method: method without implementation

  • Abstract class: class with one or more abstract methods

  • Polymorphism: ability of objects to take on multiple forms

  • Encapsulation: bundling data and behavior together

  • Inheritance: creating new classes from existing...read more

Add your answer

Q16. What you will do if you got to know there is a performance issue in code change which you developed before 1 day of production deployment

Ans.

I would immediately investigate the issue and work to resolve it before the production deployment.

  • Check the logs to identify the root cause of the performance issue

  • Analyze the code changes made and identify any potential bottlenecks

  • Work with the development team to implement a fix for the issue

  • Perform thorough testing to ensure the fix does not introduce any new issues

  • Communicate the issue and resolution to stakeholders and management

View 2 more answers

Q17. how you handle non functional requirements ? how you do capacity planning ?

Ans.

Non-functional requirements are handled by considering various factors and capacity planning is done by analyzing current and future needs.

  • Identify and prioritize non-functional requirements

  • Analyze the impact of non-functional requirements on the system

  • Design and implement solutions to meet non-functional requirements

  • Perform capacity planning by considering current and future needs

  • Monitor system performance and make adjustments as necessary

View 1 answer

Q18. 5) How to create a kafka topic with replication factor 2

Ans.

To create a Kafka topic with replication factor 2, use the command line tool or Kafka API.

  • Use the command line tool 'kafka-topics.sh' with the '--replication-factor' flag set to 2.

  • Alternatively, use the Kafka API to create a topic with a replication factor of 2.

  • Ensure that the number of brokers in the Kafka cluster is greater than or equal to the replication factor.

  • Consider setting the 'min.insync.replicas' configuration property to 2 to ensure that at least two replicas are ...read more

Add your answer

Q19. What is debit, credit, inventory, debit note credit note suspense account ect..

Ans.

Debit and credit are accounting terms used to record financial transactions. Inventory is the stock of goods a company has on hand.

  • Debit is an entry on the left side of an account, while credit is an entry on the right side of an account.

  • Inventory is the stock of goods a company has on hand and is recorded as an asset on the balance sheet.

  • A debit note is a document used to inform a vendor of a debit made to their account.

  • A credit note is a document used to inform a vendor of ...read more

Add your answer

Q20. What are different modernizations you did on Mainframes ?

Ans.

Modernizations on Mainframes include migration to cloud, adoption of DevOps practices, and integration with modern technologies.

  • Migration of mainframe applications to cloud platforms like AWS or Azure

  • Adoption of DevOps practices for continuous integration and delivery

  • Integration of mainframe systems with modern technologies like APIs and microservices

  • Replacement of legacy mainframe applications with modern web or mobile applications

  • Implementation of modern security measures a...read more

View 1 answer

Q21. What is your company's code review process? What practices you follow while writing code. How do you test your code manually?

Ans.

Our code review process involves peer reviews and automated testing. We follow best practices and use manual testing for edge cases.

  • Peer reviews are conducted for all code changes before merging into the main branch

  • We use automated testing tools like Jest and Enzyme for unit and integration testing

  • We follow best practices like writing clean and modular code, using meaningful variable names, and commenting where necessary

  • Manual testing is used for edge cases and scenarios that...read more

Add your answer

Q22. Difference between final, finalize and finally ?

Ans.

final, finalize and finally are three different keywords in Java with different meanings.

  • final is a keyword used to declare a constant variable.

  • finalize is a method used for garbage collection.

  • finally is a block used in exception handling to execute code regardless of whether an exception is thrown or not.

  • final and finally are not related in any way.

View 1 answer

Q23. What are the types of clouds?

Ans.

There are three types of clouds: public, private, and hybrid.

  • Public clouds are owned and operated by third-party providers, and the infrastructure is shared among multiple organizations.

  • Private clouds are dedicated to a single organization and can be located on-premises or hosted by a third-party provider.

  • Hybrid clouds combine public and private clouds, allowing organizations to take advantage of the benefits of both.

  • Examples of public clouds include Amazon Web Services (AWS)...read more

Add your answer

Q24. What architectural principles / methodologies you know ?

Ans.

Architectural principles and methodologies are fundamental concepts that guide the design and development of software systems.

  • Service-Oriented Architecture (SOA)

  • Microservices Architecture

  • Event-Driven Architecture (EDA)

  • Domain-Driven Design (DDD)

  • Layered Architecture

  • Component-Based Architecture

  • Model-View-Controller (MVC)

  • RESTful Architecture

  • Big Data Architecture

  • Cloud Computing Architecture

View 1 answer

Q25. What if, you are unable to find a supplier for the materials that you require.?

Ans.

If unable to find a supplier, explore alternative sources, negotiate with existing suppliers, or consider changing specifications.

  • Explore alternative sources such as online marketplaces or international suppliers

  • Negotiate with existing suppliers to see if they can provide the required materials or suggest alternative options

  • Consider changing specifications to align with available suppliers or materials

  • Collaborate with other departments or companies to pool resources and find ...read more

Add your answer

Q26. Explain how containers, docker and Kubernetes work with each other ? How do you connect to a container from public internet?

Add your answer

Q27. What is use one as many, copy value function , format by example

Ans.

These are three different functions in SAP PI/PO used for mapping and transforming data.

  • Use One As Many: Splits one source field into multiple target fields

  • Copy Value Function: Copies the value of one field to another field

  • Format by Example: Formats the target field based on the example provided

Add your answer

Q28. Have you heard about the Hybrid cloud?

Ans.

Yes, Hybrid cloud is a combination of public and private cloud infrastructure.

  • Hybrid cloud allows organizations to leverage the benefits of both public and private cloud infrastructure.

  • It provides flexibility, scalability, and cost-effectiveness.

  • For example, an organization can use a public cloud for non-sensitive data and a private cloud for sensitive data.

  • Hybrid cloud also allows for workload portability and disaster recovery options.

  • It requires proper planning and manageme...read more

Add your answer

Q29. Introduction what do you mean SAP mm what is purchase order what is sub contracting vendor what moment type use in sub contracting, what is physical inventory

Ans.

SAP MM is a module that deals with material management. Purchase order is a document used to procure goods or services. Subcontracting vendor is a vendor who provides goods or services to a company. Movement types are used in sub-contracting to track the movement of goods. Physical inventory is a process of counting and verifying the inventory on hand.

  • SAP MM deals with material management

  • Purchase order is a document used to procure goods or services

  • Subcontracting vendor is a ...read more

Add your answer

Q30. What ac will be debited and credited at the time of discounting?

Ans.

The account to be debited and credited at the time of discounting depends on the specific transaction and the parties involved.

  • In general, the account to be debited is the Discount Allowed account, which represents the expense incurred by the seller for providing the discount.

  • The account to be credited is typically the Accounts Receivable account, which represents the amount owed by the buyer for the discounted goods or services.

  • However, the specific accounts may vary dependi...read more

View 1 answer

Q31. soc 7 abend how to find ? resolve it ?

Ans.

S0C7 abend is a mainframe error caused by invalid data. It can be resolved by identifying the source of the error and correcting it.

  • S0C7 abend is caused by invalid data in a numeric field

  • To resolve it, identify the source of the error and correct it

  • Common causes include incorrect data types, invalid characters, and overflow

  • Debugging tools like IBM Debug Tool can help identify the source of the error

View 3 more answers

Q32. How the process flow in Restful service

Ans.

Restful service process flow involves client sending requests to server, which responds with data in a standardized format.

  • Client sends HTTP request to server

  • Server processes request and sends back HTTP response

  • Response is in a standardized format such as JSON or XML

  • Client can then use the response data as needed

View 2 more answers

Q33. 4) How to read json data using spark

Ans.

To read JSON data using Spark, use the SparkSession.read.json() method.

  • Create a SparkSession object

  • Use the read.json() method to read the JSON data

  • Specify the path to the JSON file or directory containing JSON files

  • The resulting DataFrame can be manipulated using Spark's DataFrame API

View 2 more answers

Q34. Can you tell me what is a difference between front end developer and backend developer

Ans.

Front end developers focus on the user interface and user experience, while backend developers handle the server-side logic and database management.

  • Front end developers work on the client-side of web development, creating the visual elements and interactions that users see and interact with.

  • They use languages like HTML, CSS, and JavaScript to build responsive and user-friendly websites.

  • Backend developers work on the server-side of web development, handling the behind-the-scen...read more

Add your answer

Q35. Your total experience is 6+ in SQL and SSIS, but your relevant experience in Datastage is 3+, and already you are on a higher package as compared with 3 years Datastage developer, we might tak a pause here as y...

read more
Ans.

My experience in SQL and SSIS has prepared me well for Datastage development. I am confident in my ability to quickly learn and excel in this role.

  • My experience in SQL and SSIS has given me a strong foundation in data integration and ETL processes.

  • I have already demonstrated my ability to learn quickly and adapt to new technologies, as evidenced by my success in my current role.

  • I am eager to expand my skillset and take on new challenges in Datastage development.

  • I am open to d...read more

Add your answer

Q36. What are the different types of AWS services used for handling Big Data in AWS. What are the storage services used ? What are the equivalents available in Azure?

Add your answer

Q37. What is the difference between Index and subscript?

Ans.

Index and subscript are used to access elements in an array or list, but index refers to the position while subscript refers to the value.

  • Index is the position of an element in an array or list, starting from 0.

  • Subscript is the value used to access an element in an array or list.

  • For example, in the array [1, 2, 3], the index of 2 is 1 and the subscript of 2 is 2.

  • Index is an integer while subscript can be any data type that can be used as an index.

  • Index is used in programming ...read more

Add your answer

Q38. 1. Difference between, IBP S&amp;OP Demand and IBP Demand. 2. What are the forecast models available in IBP S&amp;OP Demand. 3. How to configure Product life cycle in S&amp;OP Demand. 4. What is difference between IBP Supp...

read more
Add your answer

Q39. What were the challenges faced while do application migration on hybrid cloud? How to mitigate those things for successful delivery?

Ans.

Challenges in application migration on hybrid cloud and ways to mitigate them

  • Challenges include data security, network latency, and compatibility issues

  • Mitigation strategies include using encryption, optimizing network connectivity, and testing for compatibility

  • Proper planning and communication with stakeholders is crucial for successful delivery

Add your answer

Q40. What are performance enhancement practices you followed while a System got hanged or intermittent freezing?

Ans.

To enhance performance during system hang or intermittent freezing, we follow these practices:

  • Analyze system logs to identify the root cause of the issue

  • Check system resources like CPU, memory, disk usage, etc.

  • Optimize database performance by tuning parameters and indexes

  • Implement SAP recommended notes and patches

  • Monitor system performance regularly to identify potential issues

  • Implement load balancing and clustering to distribute workload

  • Use SAP tools like ST12, ST13, ST14, e...read more

Add your answer

Q41. What do you understand about DevOps and how do you achieve it in public cloud ? What services and settings are to be done in AWS or Azure for creating the CICD pipeline?

Add your answer

Q42. What is the difference between CDD and EDD

Ans.

CDD is basic due diligence while EDD is enhanced due diligence.

  • CDD is a standard process of verifying the identity of a customer and assessing the risk associated with them.

  • EDD is a more thorough process that involves gathering additional information about the customer to mitigate higher risks.

  • CDD is typically used for low-risk customers while EDD is used for high-risk customers.

  • Examples of EDD include conducting background checks, reviewing financial statements, and obtainin...read more

View 1 answer

Q43. List the activities an architect should perform to handle the disaster recovery of the application and the database. How do you handle it with minimum RTO and RPO?

Add your answer

Q44. What we are considered profit or loss how to create in your point of you

Ans.

Profit or loss is created by comparing revenue and expenses.

  • Profit is created when revenue exceeds expenses.

  • Loss is created when expenses exceed revenue.

  • Net income is calculated by subtracting expenses from revenue.

  • Profit and loss statement shows the financial performance of a company.

  • Profitability ratios like gross profit margin and net profit margin are used to analyze profit or loss.

  • Accrual accounting recognizes revenue and expenses when they are earned or incurred, while ...read more

Add your answer

Q45. 2) Difference between partitioning and Bucketing

Ans.

Partitioning is dividing data into smaller chunks based on a column value. Bucketing is dividing data into equal-sized buckets based on a hash function.

  • Partitioning is used for organizing data for efficient querying and processing.

  • Bucketing is used for evenly distributing data across nodes in a cluster.

  • Partitioning is done based on a column value, such as date or region.

  • Bucketing is done based on a hash function, such as MD5 or SHA-1.

  • Partitioning can improve query performance...read more

View 1 answer

Q46. What is structuring or round dollar , or what is three type money laundering … what is threshold … country based questions they can ask

Add your answer

Q47. Management types in snow and in how many days can join

Ans.

The question is unclear and requires clarification.

  • The question needs to be rephrased for better understanding.

  • It is unclear what is meant by 'management types in snow'.

  • The number of days it takes to join is also unclear.

  • Further clarification is needed to provide an accurate answer.

Add your answer

Q48. Technical Round: Different types of wait with differences between explicit and fluent wait

Ans.

Explicit and fluent wait are types of wait used in test automation to handle synchronization issues.

  • Explicit wait is used to wait for a specific condition to occur before proceeding further in the test script.

  • Fluent wait is used to wait for a condition with a defined polling frequency and timeout duration.

  • Explicit wait provides more control and flexibility as it allows specifying the condition and the maximum wait time.

  • Fluent wait provides a more fluent and readable way of wa...read more

View 2 more answers

Q49. How will you check if a pod in ReplicaSet went down or failed and what was the reason for the same?

Ans.

To check if a pod in ReplicaSet went down or failed, monitor the pod status, logs, and events.

  • Monitor the pod status using kubectl get pods command

  • Check the pod logs for any error messages using kubectl logs command

  • Review the events related to the pod using kubectl describe pod command

  • Set up alerts or notifications for pod failures using monitoring tools like Prometheus or Grafana

Add your answer

Q50. Which methodology I have worked on like Agile or Waterfall or both?

Ans.

I have worked on both Agile and Waterfall methodologies.

  • I have experience in Agile methodologies such as Scrum and Kanban.

  • I have also worked on Waterfall methodology in projects that require a more structured approach.

  • I understand the strengths and weaknesses of both methodologies and can adapt to the project's needs.

  • For example, I used Agile methodology in a project that required frequent changes and iterations, while I used Waterfall methodology in a project that had a clea...read more

Add your answer

Q51. Describe the entire POC Process you followed while migrating your SAP On-Premise System to the Google Cloud Platform. ( Technical Specs and Errors Encountered). Observations regarding the Sizing and Output.

Ans.

Outlined POC process for migrating SAP On-Premise System to Google Cloud Platform

  • Analyzed current system and determined necessary resources for migration

  • Created a test environment to ensure compatibility and identify errors

  • Used Cloud Migration for SAP tool to migrate data and configurations

  • Encountered errors with network connectivity and resolved through troubleshooting

  • Monitored system performance and made necessary adjustments for optimal output

Add your answer

Q52. Big data Hadoop architecture and HDFS commands to copy and list files in hdfs spark architecture and Transformation and Action question what happen when we submit spark program spark dataframe coding question s...

read more
Ans.

Questions on big data, Hadoop, Spark, Scala, Git, project and Agile.

  • Hadoop architecture and HDFS commands for copying and listing files in HDFS

  • Spark architecture and Transformation and Action question

  • What happens when we submit a Spark program

  • Spark DataFrame coding question

  • Scala basic program on List

  • Git and Github

  • Project-related question

  • Agile-related

Add your answer

Q53. Difference between SOAP &amp; REST, remove and collapse context, file and sftp?

Ans.

SOAP is a protocol for exchanging structured information, while REST is an architectural style for building web services.

  • SOAP uses XML to encode messages, while REST uses a variety of formats such as JSON, XML, or plain text.

  • SOAP is more rigid and requires more bandwidth, while REST is more flexible and lightweight.

  • Remove context is used to remove the context of a message, while collapse context is used to collapse the context of a message.

  • File is used to transfer files betwe...read more

Add your answer

Q54. How to check whether a file in empty or not using JCL.

Ans.

Checking if a file is empty using JCL

  • Use the IDCAMS utility to check the file's status

  • Check the file's record count using the LISTCAT command

  • Use the SORT utility to check if the file has any records

  • Use the DFSORT utility to check if the file has any records

Add your answer

Q55. 3) Difference between cache and persistent storage

Ans.

Cache is temporary storage used to speed up access to frequently accessed data. Persistent storage is permanent storage used to store data even after power loss.

  • Cache is faster but smaller than persistent storage

  • Cache is volatile and data is lost when power is lost

  • Persistent storage is non-volatile and data is retained even after power loss

  • Examples of cache include CPU cache, browser cache, and CDN cache

  • Examples of persistent storage include hard disk drives, solid-state driv...read more

View 2 more answers

Q56. what you should see in the show interface type/member/module/number?

Ans.

The show interface command displays the status and statistics of a network interface.

  • Displays the interface type, member, module, and number

  • Shows the current status of the interface (up or down)

  • Displays the number of packets transmitted and received

  • Shows the number of errors and discards

  • Displays the speed and duplex settings of the interface

Add your answer

Q57. What is network and how many type are ther?

Ans.

A network is a group of interconnected devices that communicate with each other. There are three types of networks: LAN, WAN, and MAN.

  • A LAN (Local Area Network) is a network that covers a small area, like a home or office.

  • A WAN (Wide Area Network) is a network that covers a large area, like a city or country.

  • A MAN (Metropolitan Area Network) is a network that covers a larger area than a LAN but smaller than a WAN, like a city.

  • Other types of networks include WLAN (Wireless Loc...read more

Add your answer

Q58. How to you prepare EMI and balance sheet end of the month or year reporting how to prepare

Ans.

To prepare EMI and balance sheet end of the month or year reporting, follow these steps:

  • Ensure all transactions are recorded accurately and completely

  • Reconcile bank statements and other accounts

  • Prepare adjusting entries for accruals and deferrals

  • Organize accounts into appropriate categories for the balance sheet

  • Calculate EMI based on loan amount, interest rate, and term

  • Verify accuracy of all calculations

  • Prepare financial statements and reports

  • Review and analyze financial data...read more

Add your answer

Q59. What is the advantage of SLT Replication compared to other replication Methods?

Ans.

SLT Replication offers real-time data replication with minimal system impact.

  • SLT Replication allows for real-time data replication from multiple sources to a single target system.

  • It offers minimal system impact as it uses trigger-based replication instead of full table scans.

  • SLT Replication also provides data transformation capabilities and supports heterogeneous data replication.

  • Compared to other replication methods, SLT Replication is more efficient and cost-effective.

  • For e...read more

Add your answer

Q60. Have you worked on CDS, steps to implement CDS view?

Ans.

Yes, I have worked on CDS views and implemented them in SAP systems.

  • Define CDS view in ABAP Dictionary using DDL source code

  • Activate CDS view using ABAP Development Tools (ADT)

  • Use CDS view in ABAP programs for data retrieval and manipulation

Add your answer

Q61. How do you monitor your application and what are the configurations?

Ans.

Application monitoring is done through various tools and configurations.

  • We use tools like Nagios, Zabbix, and Prometheus for monitoring.

  • We configure alerts for critical events and set up dashboards for easy visualization.

  • We also use log aggregation tools like ELK stack to monitor application logs.

  • We monitor system resources like CPU, memory, and disk usage.

  • We perform load testing to identify performance bottlenecks.

  • We use APM tools like New Relic and AppDynamics to monitor ap...read more

Add your answer

Q62. What's the ad value of bgp and bgp States?

Ans.

BGP (Border Gateway Protocol) is a routing protocol used in internet networks. It provides scalability, redundancy, and policy control.

  • BGP is used to exchange routing information between different autonomous systems (AS)

  • It allows for efficient routing decisions based on policies and network conditions

  • BGP states represent the different stages of establishing and maintaining BGP peering sessions

  • Examples of BGP states include Idle, Connect, Active, OpenSent, OpenConfirm, Establi...read more

View 2 more answers

Q63. How do you calculate the cost implications when proposing an architecture? What are the steps involved in migrating an existing application to Cloud?

Add your answer

Q64. What are modules in Terraform, share your screen and write module

Ans.

Modules in Terraform are reusable components that allow you to encapsulate and organize your infrastructure code.

  • Modules help in breaking down complex infrastructure into smaller, manageable components

  • They promote reusability and maintainability of code

  • Modules can be shared and used across different projects

  • Example: Creating a module for provisioning a virtual machine in Azure

Add your answer

Q65. How would you provide security to your credentials while using Terraform

Ans.

Use encrypted variables, limit access to credentials, and utilize secure storage solutions.

  • Encrypt sensitive variables using tools like Vault or AWS KMS

  • Limit access to credentials by using least privilege principles

  • Store credentials securely in a password manager or key vault

  • Avoid hardcoding credentials in Terraform configuration files

Add your answer

Q66. If you are using CICD define your stages and issues you faced

Ans.

CICD stages include build, test, deploy, and monitor. Common issues include integration challenges and pipeline failures.

  • Stages: Build, Test, Deploy, Monitor

  • Issues: Integration challenges, Pipeline failures

  • Example: Integration challenges with third-party tools delaying deployment

Add your answer

Q67. Will you be able to work if given any type of work like either DevOps or only Cloud or only Development?

Ans.

Yes, I am capable of working in various roles such as DevOps, Cloud, and Development.

  • I have experience and skills in DevOps practices such as automation, CI/CD, and infrastructure as code.

  • I am proficient in cloud technologies like AWS, Azure, or Google Cloud Platform.

  • I have a strong background in software development with expertise in languages like Python, Java, or JavaScript.

Add your answer

Q68. Which server and version is being used and how to configure the data source in WebLogic server

Ans.

The server being used is WebLogic and the version is not specified. Data source can be configured through the console or configuration files.

  • WebLogic server is being used

  • Version is not specified

  • Data source can be configured through console or configuration files

Add your answer

Q69. Statement vs prepared statements(whats the use of pstmts over stmts), why microservice when the same can happen in monolithic(Not normal differences expected something else), how Rest API will work (internal pr...

read more
Ans.

Prepared statements are precompiled SQL statements that can improve performance and security. Microservices offer scalability and flexibility over monolithic architecture. REST API works by using HTTP methods to interact with resources.

  • Prepared statements are precompiled SQL statements that can be reused multiple times, improving performance by reducing database load and preventing SQL injection attacks.

  • Microservices allow for independent deployment, scalability, and flexibil...read more

Add your answer

Q70. From which scenario we can identify that HANA Database has an issue which is caused by Memory?

Ans.

HANA Database memory issue identification scenario

  • High memory consumption by HANA processes

  • Frequent garbage collection

  • Slow query performance

  • Out of memory errors in HANA logs

  • Memory-related alerts in HANA monitoring tools

Add your answer

Q71. Difference between standard order and rush order? How the delivery is created immediately in rush order, where are the controls?

Ans.

Standard orders have regular delivery times while rush orders require immediate delivery. Controls for rush orders are typically set in the system.

  • Standard orders have regular delivery times based on the company's standard processing and shipping times.

  • Rush orders are prioritized for immediate delivery, often with expedited processing and shipping.

  • Controls for rush orders are usually set in the system, such as flagging the order as a rush order or assigning it to a specific t...read more

Add your answer

Q72. What will happen if I won't maintain account modifier?

Ans.

Not maintaining account modifier can lead to incorrect financial reporting and accounting errors.

  • Account modifier is used to differentiate between different types of transactions in financial reporting.

  • If not maintained, it can lead to incorrect financial statements and accounting errors.

  • For example, if a company has multiple revenue streams, not maintaining account modifier can lead to revenue from different streams being reported together, leading to incorrect financial ana...read more

Add your answer

Q73. Name the service which is required for time sync and how to configure it?

Ans.

The service required for time sync is Network Time Protocol (NTP).

  • NTP is a protocol used to synchronize the clocks of computers over a network.

  • It ensures accurate timekeeping and consistency across systems.

  • To configure NTP, the administrator needs to specify NTP servers in the system's configuration file.

  • Examples of NTP servers are time.google.com, pool.ntp.org, etc.

  • The system periodically queries the NTP servers to adjust its clock accordingly.

View 1 answer

Q74. When to use and not to use NoSQL databases such as Redis, Cassandra and MongoDB.

Ans.

NoSQL databases like Redis, Cassandra, and MongoDB should be used when dealing with large amounts of unstructured data.

  • Use NoSQL databases when dealing with large amounts of unstructured data

  • Use NoSQL databases when scalability is a concern

  • Use NoSQL databases when flexibility is needed

  • Do not use NoSQL databases when dealing with structured data

  • Do not use NoSQL databases when ACID compliance is required

Add your answer

Q75. What is code inspector , what is assistance class

Ans.

Code Inspector is a tool to check code quality. Assistance class is a reusable class to provide common functionality.

  • Code Inspector checks for syntax errors, performance issues, security vulnerabilities, and adherence to coding standards.

  • Assistance class provides reusable code for common functionality like date and time calculations, string operations, and database access.

  • Assistance class can be used in multiple programs, reducing code duplication and improving maintainabilit...read more

Add your answer

Q76. What is the HANA Performance Improvement that you have done?

Ans.

Implemented HANA table partitioning and index optimization resulting in 50% faster query performance.

  • Implemented table partitioning based on frequently accessed data

  • Optimized indexes to reduce data retrieval time

  • Tuned HANA parameters for better memory allocation

  • Reduced data footprint by archiving historical data

  • Implemented data compression to reduce storage requirements

View 1 answer

Q77. what are the optimization techniques used in your project

Ans.

Optimization techniques used in project

  • Caching

  • Parallel processing

  • Compression

  • Indexing

  • Query optimization

Add your answer

Q78. What is a role of support engineer

Ans.

A support engineer is responsible for providing technical assistance and resolving issues related to software or hardware systems.

  • Providing technical support to customers or end-users

  • Troubleshooting and resolving software or hardware issues

  • Installing, configuring, and maintaining systems

  • Monitoring system performance and identifying potential problems

  • Collaborating with development teams to address bugs or enhancements

  • Documenting support processes and creating knowledge base ar...read more

View 1 answer

Q79. What is the range of private ip address?

Ans.

The range of private IP addresses is defined by three blocks: 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255.

  • Private IP addresses are used within private networks and are not routable on the internet.

  • The three blocks of private IP addresses are reserved for use in local area networks (LANs) and are not unique globally.

  • Private IP addresses allow organizations to have multiple devices with the same IP addresses within their private ...read more

View 2 more answers

Q80. What is purchase requestition ?

Ans.

A purchase requisition is a document used to request goods or services from a supplier.

  • It is a formal request for procurement of goods or services.

  • It includes details such as quantity, description, and estimated cost.

  • It is typically initiated by a department or individual within an organization.

  • It is used to obtain approval for the purchase before it is made.

  • It is an important part of the procurement process.

  • Example: A department within a company needs to purchase new compute...read more

Add your answer

Q81. SQL query to find max salary in different areas of employee

Ans.

Use SQL query to find max salary in different areas of employee

  • Use GROUP BY clause to group employees by area

  • Use MAX() function to find the maximum salary in each group

  • Combine GROUP BY and MAX() to get the desired result

Add your answer

Q82. How to find dynamic element in a page

Ans.

Dynamic elements can be found using various methods such as inspecting the page source code, using browser developer tools, or using automation tools.

  • Inspect the page source code to identify dynamic elements that have unique attributes or IDs

  • Use browser developer tools to inspect the page and identify dynamic elements that change based on user interactions

  • Use automation tools such as Selenium to locate dynamic elements by using wait conditions or element locators

  • Examples of d...read more

View 2 more answers

Q83. What is the Docker? what is the best practice of writing a docker file?

Ans.

Docker is a containerization platform that allows developers to package and deploy applications in a portable manner.

  • Dockerfile is a script that contains instructions to build a Docker image

  • Best practices include keeping the image size small, using a single process per container, and using environment variables for configuration

  • Use multi-stage builds to reduce image size and improve security

  • Avoid running containers as root to minimize security risks

  • Regularly update base image...read more

Add your answer

Q84. What are different security patterns that can be implemented on soap and rest services?

Ans.

Security patterns for SOAP and REST services

  • Use HTTPS for secure communication

  • Implement authentication and authorization mechanisms

  • Use message encryption and decryption

  • Implement input validation and output encoding

  • Use rate limiting to prevent DoS attacks

  • Implement logging and monitoring for security incidents

  • Use OAuth for secure API access

  • Implement CORS to restrict access from unauthorized domains

Add your answer

Q85. How to validate the po ?

Ans.

To validate a PO, check for accuracy, completeness, and compliance with procurement policies.

  • Verify that the PO number matches the one in the system

  • Ensure that the vendor information is correct

  • Check that the items ordered match the specifications and quantities requested

  • Confirm that the prices are accurate and in line with the budget

  • Ensure that the PO is authorized and approved by the appropriate personnel

  • Check that the delivery date and location are correct

  • Verify that the te...read more

Add your answer

Q86. CI-CD Flow and how we have implemented in our project

Ans.

CI-CD flow is implemented in our project for continuous integration and delivery of software.

  • We use Jenkins as our CI/CD tool.

  • Our code is stored in Git repository and is automatically built and tested on every commit.

  • We have multiple environments for testing and deployment, including staging and production.

  • We use Docker containers for easy deployment and scalability.

  • Our CI/CD pipeline includes automated testing, code analysis, and deployment.

  • We have implemented blue-green dep...read more

Add your answer

Q87. Router components service angular performance optimization how to scale app, security

Ans.

Optimizing Angular app performance and security with router components and services

  • Use lazy loading to improve performance

  • Implement caching for frequently accessed data

  • Use Angular Universal for server-side rendering

  • Implement HTTPS and secure authentication for security

  • Use guards and interceptors to protect routes and prevent unauthorized access

Add your answer

Q88. How do you create a custom directive? Give one example.

Ans.

Creating a custom directive involves defining a new behavior for an HTML element.

  • Use the AngularJS module method to create a new module

  • Define the directive using the directive method

  • Specify the directive's behavior using the link function

  • Add the directive to an HTML element using the directive's name

  • Example: creating a directive to display a tooltip on hover

Add your answer

Q89. What is DNS,DHCP,IP address,RJ-45?

Ans.

DNS is a system that translates domain names into IP addresses. DHCP is a protocol for assigning IP addresses. IP address is a unique identifier for devices. RJ-45 is a type of connector used for Ethernet cables.

  • DNS translates domain names (e.g., www.example.com) into IP addresses (e.g., 192.168.1.1).

  • DHCP is a protocol that automatically assigns IP addresses to devices on a network.

  • An IP address is a numerical label assigned to each device connected to a computer network.

  • RJ-4...read more

View 1 answer

Q90. What do you know about Forms and Templates and its use in workflow and webreports

Ans.

Forms and Templates are used in workflow and web reports to standardize data input and presentation.

  • Forms are used to collect data in a structured manner, often with predefined fields and formats

  • Templates are pre-designed layouts for presenting data in a consistent way

  • Forms and Templates help streamline processes, ensure data consistency, and improve reporting accuracy

  • In workflow management, Forms can be used to gather input from users at different stages of a process

  • Web repo...read more

Add your answer

Q91. 1) Project Architecture 2) Complex job handles in project 3) Types of lookup 4) SCD -2 implementation in datastage 5) sql - analytical functions,scenario based question 6) Unix - SED/GREP command

Ans.

The interview questions cover project architecture, complex job handling, lookup types, SCD-2 implementation, SQL analytical functions, and Unix commands.

  • Project architecture involves designing the overall structure of a data project.

  • Complex job handling refers to managing intricate data processing tasks within a project.

  • Lookup types include exact match, range match, and fuzzy match.

  • SCD-2 implementation in DataStage involves capturing historical changes in data.

  • SQL analytical...read more

Add your answer

Q92. 1. what do we use spring boot 2. Microservice design pattern

Ans.

Spring Boot is used for developing stand-alone, production-grade Spring-based applications.

  • Spring Boot simplifies the development process by providing auto-configuration and opinionated defaults.

  • It allows developers to quickly create and deploy applications with minimal configuration.

  • Spring Boot provides a range of features like embedded servers, metrics, health checks, and security.

  • It supports various technologies and frameworks, making it easy to integrate with existing sys...read more

Add your answer

Q93. What are the troubleshooting you will do when you are not able to connect to a server?

Ans.

I will check network connectivity, firewall settings, and server status.

  • Check if the server is powered on and running

  • Verify network connectivity between the client and server

  • Check firewall settings to ensure the server is not blocked

  • Check if the server is reachable via ping or telnet

  • Check server logs for any errors or issues

  • Verify DNS settings are correct

Add your answer

Q94. Cyclomatic Complexity in Salesforce

Ans.

Cyclomatic Complexity is a software metric that measures the complexity of a program based on its control flow.

  • Cyclomatic Complexity is calculated by counting the number of decision points in a program.

  • It helps in identifying complex code that may be difficult to understand, test, and maintain.

  • Higher Cyclomatic Complexity indicates higher risk and potential for bugs.

  • Reducing Cyclomatic Complexity can improve code quality and maintainability.

  • Salesforce provides tools like PMD ...read more

View 3 more answers

Q95. Whether using microservice or not. Why microservice

Ans.

Microservices offer scalability, flexibility, and faster deployment.

  • Microservices allow for independent deployment and scaling of individual components

  • They enable faster development and deployment cycles

  • They promote flexibility and agility in software development

  • Examples include Netflix, Amazon, and Uber

Add your answer

Q96. How do you prepare of ledger posting

Ans.

Ledger posting involves recording financial transactions in the appropriate accounts.

  • Identify the accounts affected by the transaction

  • Determine the type of account (asset, liability, equity, revenue, expense)

  • Debit or credit the appropriate account based on the transaction type

  • Record the transaction in the general ledger

  • Ensure accuracy and completeness of the posting

Add your answer

Q97. Explain the entire process of your DevOps project? what are the components of Kubernetes?

Ans.

The DevOps project involves continuous integration, delivery, and deployment of software. Kubernetes components include pods, services, deployments, and namespaces.

  • The DevOps process starts with developers committing code to a version control system like Git.

  • The code is then built and tested using continuous integration tools like Jenkins.

  • The built code is packaged into containers using tools like Docker.

  • The containers are deployed to a Kubernetes cluster using tools like kub...read more

Add your answer

Q98. Spring Security &amp; How Security has been achieved in my application

Ans.

Spring Security is used for authentication and authorization in the application.

  • Spring Security provides a framework for securing web applications.

  • It uses various authentication and authorization mechanisms such as form-based, basic, and OAuth2.

  • In our application, we have used form-based authentication with user credentials stored in a database.

  • We have also implemented role-based authorization to restrict access to certain resources.

  • Spring Security also provides features like...read more

Add your answer

Q99. Give example of how high level item category is used st document level

Ans.

High level item category is used at document level to group similar items together for easier tracking and reporting.

  • High level item category can be used to classify items based on their type, purpose, or department.

  • It helps in organizing and grouping items for better visibility and analysis.

  • For example, in a procurement document, high level item category can be used to group all office supplies together for easier tracking and reporting.

Add your answer

Q100. Who creats pr and how ?

Ans.

PR is created by the PR department or agency, in collaboration with the relevant stakeholders.

  • PR department or agency is responsible for creating PR

  • Collaboration with relevant stakeholders is necessary

  • PR creation involves identifying target audience, crafting key messages, and selecting appropriate channels

  • PR can be created for various purposes such as brand awareness, crisis management, product launches, etc.

Add your answer
1
2
3
4
5

More about working at IBM

Top Rated Mega Company - 2024
Top Rated Company for Women - 2024
Top Rated IT/ITES Company - 2024
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at FOX Solutions

based on 916 interviews in the last 1 year
Interview experience
4.2
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.0
 • 689 Interview Questions
3.5
 • 424 Interview Questions
4.2
 • 349 Interview Questions
3.8
 • 347 Interview Questions
4.2
 • 296 Interview Questions
4.2
 • 237 Interview Questions
View all
Top IBM Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter