IBM
400+ FOX Solutions Interview Questions and Answers
Q1. what is comp & comp 3 differance ?
COMP and COMP-3 are data types used in COBOL programming language.
COMP is a binary data type that stores numeric values as binary integers.
COMP-3 is a packed decimal data type that stores numeric values as packed decimal digits.
COMP uses less storage space compared to COMP-3.
COMP-3 is more suitable for decimal arithmetic operations.
COMP-3 values are stored in a packed format, where each digit occupies half a byte.
COMP-3 values can represent both positive and negative numbers.
Q2. we have 2 files eliminate duplicates and send to duplicate files in to another out put file how to achieve it ?
To eliminate duplicates from 2 files and send them to another output file, we can use a combination of file reading, hashing, and file writing.
Read the contents of both files and store them in separate arrays or lists.
Create a hash table or dictionary to keep track of the unique elements in the arrays.
Iterate through the arrays and add each element to the hash table. If the element already exists, skip it.
Write the contents of the hash table to the output file.
If needed, writ...read more
Q3. What is inheritance and what are their types? Explain them.
Inheritance is a mechanism in object-oriented programming where a new class is derived from an existing class.
It allows the new class to inherit the properties and methods of the existing class.
There are two types of inheritance: single and multiple.
Single inheritance is when a class inherits from only one parent class.
Multiple inheritance is when a class inherits from multiple parent classes.
For example, a class 'Car' can inherit from a parent class 'Vehicle' which has prope...read more
Q4. how to check file is empty or not ?
To check if a file is empty or not, we can use the file's size or read the file and check for any content.
Get the size of the file using file system APIs and check if it is zero.
Read the file and check if it contains any content.
Handle exceptions or errors that may occur during file operations.
Q5. What are the detail that you will share to the supplier for getting a quote.?
The details to share with the supplier for a quote
Product specifications
Quantity required
Delivery timeline
Quality standards
Payment terms
Any specific packaging or labeling requirements
Any applicable certifications or regulatory compliance
Expected pricing or budget constraints
Q6. 1) How to handle data skewness in spark.
Data skewness in Spark can be handled by partitioning, bucketing, or using salting techniques.
Partitioning the data based on a key column can distribute the data evenly across the nodes.
Bucketing can group the data into buckets based on a key column, which can improve join performance.
Salting involves adding a random prefix to the key column, which can distribute the data evenly.
Using broadcast joins for small tables can also help in reducing skewness.
Using dynamic allocation...read more
Q7. how many ways data pass jcl to cobol program ?
Data can pass from JCL to COBOL program in multiple ways, such as through input files, system symbols, and program parameters.
Input files: Data can be passed to a COBOL program through input files specified in the JCL.
System symbols: JCL can define system symbols that can be accessed by the COBOL program to retrieve data.
Program parameters: JCL can pass parameters to the COBOL program, which can be used to receive data.
Environment variables: JCL can set environment variables ...read more
Q8. What do you know about Ariba, how ariba is different from other Procurement Tools.?
Ariba is a procurement tool that offers a comprehensive suite of solutions for procurement processes.
Ariba provides end-to-end procurement solutions, including sourcing, contract management, supplier management, and procurement analytics.
It offers a cloud-based platform that allows for easy collaboration between buyers and suppliers.
Ariba's network connects millions of buyers and suppliers globally, enabling efficient procurement processes.
The tool provides real-time visibili...read more
Q9. how to get distinct data without using distinct keyword
To get distinct data without using distinct keyword, use GROUP BY clause.
Use GROUP BY clause with the column name to group the data by that column.
Use aggregate functions like COUNT, SUM, AVG, etc. to get the desired result.
Example: SELECT column_name FROM table_name GROUP BY column_name;
Example: SELECT column_name, COUNT(*) FROM table_name GROUP BY column_name;
Q10. What are polymorphism, abstraction, and encapsulation?
Polymorphism, abstraction, and encapsulation are three fundamental concepts in object-oriented programming.
Polymorphism allows objects of different classes to be treated as if they are objects of the same class.
Abstraction is the process of hiding complex implementation details and showing only the necessary information to the user.
Encapsulation is the practice of keeping the internal workings of an object hidden from the outside world.
Examples of polymorphism include method ...read more
Q11. How to manage clients, how to handle critical issues with example
Managing clients and handling critical issues
Establish clear communication channels with clients
Set realistic expectations and manage client's expectations
Proactively identify and address potential issues
Provide timely updates and resolutions
Maintain a positive and professional attitude
Document and learn from critical issues for future improvement
Q12. Stages of AML, types of alerts in transaction monitoring, sanctions
The stages of AML include customer identification, transaction monitoring, and reporting. Types of alerts in transaction monitoring include high-risk transactions, unusual activity, and potential money laundering. Sanctions refer to restrictions imposed on individuals or entities by governments or international organizations.
Stages of AML: customer identification, transaction monitoring, reporting
Types of alerts in transaction monitoring: high-risk transactions, unusual activ...read more
Q13. how to data insert or update in table ?
To insert or update data in a table, use SQL statements like INSERT INTO or UPDATE.
For inserting data, use the INSERT INTO statement followed by the table name and column names.
Specify the values to be inserted using the VALUES keyword.
For updating data, use the UPDATE statement followed by the table name.
Set the column values to be updated using the SET keyword.
Use conditions with the WHERE clause to specify which rows to update.
Q14. what is array ? how to load data ?
An array is a data structure that stores a collection of elements of the same type.
Arrays can be used to store and access multiple values using a single variable.
To load data into an array of strings, you can assign values to each element individually or use a loop.
Example: String[] names = {"John", "Jane", "Mike"};
Example: for(int i = 0; i < names.length; i++) { names[i] = "Value" + i; }
Q15. In C# --> Abstraction, Interface , Abstract Method, Abstract Class, Polymorphisms, Encapsulation ,Inheritance, Serialization,
C# concepts including abstraction, interface, abstract method, abstract class, polymorphism, encapsulation, inheritance, and serialization.
Abstraction: hiding implementation details
Interface: defining a contract for behavior
Abstract method: method without implementation
Abstract class: class with one or more abstract methods
Polymorphism: ability of objects to take on multiple forms
Encapsulation: bundling data and behavior together
Inheritance: creating new classes from existing...read more
Q16. What you will do if you got to know there is a performance issue in code change which you developed before 1 day of production deployment
I would immediately investigate the issue and work to resolve it before the production deployment.
Check the logs to identify the root cause of the performance issue
Analyze the code changes made and identify any potential bottlenecks
Work with the development team to implement a fix for the issue
Perform thorough testing to ensure the fix does not introduce any new issues
Communicate the issue and resolution to stakeholders and management
Q17. how you handle non functional requirements ? how you do capacity planning ?
Non-functional requirements are handled by considering various factors and capacity planning is done by analyzing current and future needs.
Identify and prioritize non-functional requirements
Analyze the impact of non-functional requirements on the system
Design and implement solutions to meet non-functional requirements
Perform capacity planning by considering current and future needs
Monitor system performance and make adjustments as necessary
Q18. 5) How to create a kafka topic with replication factor 2
To create a Kafka topic with replication factor 2, use the command line tool or Kafka API.
Use the command line tool 'kafka-topics.sh' with the '--replication-factor' flag set to 2.
Alternatively, use the Kafka API to create a topic with a replication factor of 2.
Ensure that the number of brokers in the Kafka cluster is greater than or equal to the replication factor.
Consider setting the 'min.insync.replicas' configuration property to 2 to ensure that at least two replicas are ...read more
Q19. What is debit, credit, inventory, debit note credit note suspense account ect..
Debit and credit are accounting terms used to record financial transactions. Inventory is the stock of goods a company has on hand.
Debit is an entry on the left side of an account, while credit is an entry on the right side of an account.
Inventory is the stock of goods a company has on hand and is recorded as an asset on the balance sheet.
A debit note is a document used to inform a vendor of a debit made to their account.
A credit note is a document used to inform a vendor of ...read more
Q20. What are different modernizations you did on Mainframes ?
Modernizations on Mainframes include migration to cloud, adoption of DevOps practices, and integration with modern technologies.
Migration of mainframe applications to cloud platforms like AWS or Azure
Adoption of DevOps practices for continuous integration and delivery
Integration of mainframe systems with modern technologies like APIs and microservices
Replacement of legacy mainframe applications with modern web or mobile applications
Implementation of modern security measures a...read more
Q21. What is your company's code review process? What practices you follow while writing code. How do you test your code manually?
Our code review process involves peer reviews and automated testing. We follow best practices and use manual testing for edge cases.
Peer reviews are conducted for all code changes before merging into the main branch
We use automated testing tools like Jest and Enzyme for unit and integration testing
We follow best practices like writing clean and modular code, using meaningful variable names, and commenting where necessary
Manual testing is used for edge cases and scenarios that...read more
Q22. Difference between final, finalize and finally ?
final, finalize and finally are three different keywords in Java with different meanings.
final is a keyword used to declare a constant variable.
finalize is a method used for garbage collection.
finally is a block used in exception handling to execute code regardless of whether an exception is thrown or not.
final and finally are not related in any way.
Q23. What are the types of clouds?
There are three types of clouds: public, private, and hybrid.
Public clouds are owned and operated by third-party providers, and the infrastructure is shared among multiple organizations.
Private clouds are dedicated to a single organization and can be located on-premises or hosted by a third-party provider.
Hybrid clouds combine public and private clouds, allowing organizations to take advantage of the benefits of both.
Examples of public clouds include Amazon Web Services (AWS)...read more
Q24. What architectural principles / methodologies you know ?
Architectural principles and methodologies are fundamental concepts that guide the design and development of software systems.
Service-Oriented Architecture (SOA)
Microservices Architecture
Event-Driven Architecture (EDA)
Domain-Driven Design (DDD)
Layered Architecture
Component-Based Architecture
Model-View-Controller (MVC)
RESTful Architecture
Big Data Architecture
Cloud Computing Architecture
Q25. What if, you are unable to find a supplier for the materials that you require.?
If unable to find a supplier, explore alternative sources, negotiate with existing suppliers, or consider changing specifications.
Explore alternative sources such as online marketplaces or international suppliers
Negotiate with existing suppliers to see if they can provide the required materials or suggest alternative options
Consider changing specifications to align with available suppliers or materials
Collaborate with other departments or companies to pool resources and find ...read more
Q26. Explain how containers, docker and Kubernetes work with each other ? How do you connect to a container from public internet?
Q27. What is use one as many, copy value function , format by example
These are three different functions in SAP PI/PO used for mapping and transforming data.
Use One As Many: Splits one source field into multiple target fields
Copy Value Function: Copies the value of one field to another field
Format by Example: Formats the target field based on the example provided
Q28. Have you heard about the Hybrid cloud?
Yes, Hybrid cloud is a combination of public and private cloud infrastructure.
Hybrid cloud allows organizations to leverage the benefits of both public and private cloud infrastructure.
It provides flexibility, scalability, and cost-effectiveness.
For example, an organization can use a public cloud for non-sensitive data and a private cloud for sensitive data.
Hybrid cloud also allows for workload portability and disaster recovery options.
It requires proper planning and manageme...read more
Q29. Introduction what do you mean SAP mm what is purchase order what is sub contracting vendor what moment type use in sub contracting, what is physical inventory
SAP MM is a module that deals with material management. Purchase order is a document used to procure goods or services. Subcontracting vendor is a vendor who provides goods or services to a company. Movement types are used in sub-contracting to track the movement of goods. Physical inventory is a process of counting and verifying the inventory on hand.
SAP MM deals with material management
Purchase order is a document used to procure goods or services
Subcontracting vendor is a ...read more
Q30. What ac will be debited and credited at the time of discounting?
The account to be debited and credited at the time of discounting depends on the specific transaction and the parties involved.
In general, the account to be debited is the Discount Allowed account, which represents the expense incurred by the seller for providing the discount.
The account to be credited is typically the Accounts Receivable account, which represents the amount owed by the buyer for the discounted goods or services.
However, the specific accounts may vary dependi...read more
Q31. soc 7 abend how to find ? resolve it ?
S0C7 abend is a mainframe error caused by invalid data. It can be resolved by identifying the source of the error and correcting it.
S0C7 abend is caused by invalid data in a numeric field
To resolve it, identify the source of the error and correct it
Common causes include incorrect data types, invalid characters, and overflow
Debugging tools like IBM Debug Tool can help identify the source of the error
Q32. How the process flow in Restful service
Restful service process flow involves client sending requests to server, which responds with data in a standardized format.
Client sends HTTP request to server
Server processes request and sends back HTTP response
Response is in a standardized format such as JSON or XML
Client can then use the response data as needed
Q33. 4) How to read json data using spark
To read JSON data using Spark, use the SparkSession.read.json() method.
Create a SparkSession object
Use the read.json() method to read the JSON data
Specify the path to the JSON file or directory containing JSON files
The resulting DataFrame can be manipulated using Spark's DataFrame API
Q34. Can you tell me what is a difference between front end developer and backend developer
Front end developers focus on the user interface and user experience, while backend developers handle the server-side logic and database management.
Front end developers work on the client-side of web development, creating the visual elements and interactions that users see and interact with.
They use languages like HTML, CSS, and JavaScript to build responsive and user-friendly websites.
Backend developers work on the server-side of web development, handling the behind-the-scen...read more
Q35. Your total experience is 6+ in SQL and SSIS, but your relevant experience in Datastage is 3+, and already you are on a higher package as compared with 3 years Datastage developer, we might tak a pause here as y...
read moreMy experience in SQL and SSIS has prepared me well for Datastage development. I am confident in my ability to quickly learn and excel in this role.
My experience in SQL and SSIS has given me a strong foundation in data integration and ETL processes.
I have already demonstrated my ability to learn quickly and adapt to new technologies, as evidenced by my success in my current role.
I am eager to expand my skillset and take on new challenges in Datastage development.
I am open to d...read more
Q36. What are the different types of AWS services used for handling Big Data in AWS. What are the storage services used ? What are the equivalents available in Azure?
Q37. What is the difference between Index and subscript?
Index and subscript are used to access elements in an array or list, but index refers to the position while subscript refers to the value.
Index is the position of an element in an array or list, starting from 0.
Subscript is the value used to access an element in an array or list.
For example, in the array [1, 2, 3], the index of 2 is 1 and the subscript of 2 is 2.
Index is an integer while subscript can be any data type that can be used as an index.
Index is used in programming ...read more
Q38. 1. Difference between, IBP S&OP Demand and IBP Demand. 2. What are the forecast models available in IBP S&OP Demand. 3. How to configure Product life cycle in S&OP Demand. 4. What is difference between IBP Supp...
read moreQ39. What were the challenges faced while do application migration on hybrid cloud? How to mitigate those things for successful delivery?
Challenges in application migration on hybrid cloud and ways to mitigate them
Challenges include data security, network latency, and compatibility issues
Mitigation strategies include using encryption, optimizing network connectivity, and testing for compatibility
Proper planning and communication with stakeholders is crucial for successful delivery
Q40. What are performance enhancement practices you followed while a System got hanged or intermittent freezing?
To enhance performance during system hang or intermittent freezing, we follow these practices:
Analyze system logs to identify the root cause of the issue
Check system resources like CPU, memory, disk usage, etc.
Optimize database performance by tuning parameters and indexes
Implement SAP recommended notes and patches
Monitor system performance regularly to identify potential issues
Implement load balancing and clustering to distribute workload
Use SAP tools like ST12, ST13, ST14, e...read more
Q41. What do you understand about DevOps and how do you achieve it in public cloud ? What services and settings are to be done in AWS or Azure for creating the CICD pipeline?
Q42. What is the difference between CDD and EDD
CDD is basic due diligence while EDD is enhanced due diligence.
CDD is a standard process of verifying the identity of a customer and assessing the risk associated with them.
EDD is a more thorough process that involves gathering additional information about the customer to mitigate higher risks.
CDD is typically used for low-risk customers while EDD is used for high-risk customers.
Examples of EDD include conducting background checks, reviewing financial statements, and obtainin...read more
Q43. List the activities an architect should perform to handle the disaster recovery of the application and the database. How do you handle it with minimum RTO and RPO?
Q44. What we are considered profit or loss how to create in your point of you
Profit or loss is created by comparing revenue and expenses.
Profit is created when revenue exceeds expenses.
Loss is created when expenses exceed revenue.
Net income is calculated by subtracting expenses from revenue.
Profit and loss statement shows the financial performance of a company.
Profitability ratios like gross profit margin and net profit margin are used to analyze profit or loss.
Accrual accounting recognizes revenue and expenses when they are earned or incurred, while ...read more
Q45. 2) Difference between partitioning and Bucketing
Partitioning is dividing data into smaller chunks based on a column value. Bucketing is dividing data into equal-sized buckets based on a hash function.
Partitioning is used for organizing data for efficient querying and processing.
Bucketing is used for evenly distributing data across nodes in a cluster.
Partitioning is done based on a column value, such as date or region.
Bucketing is done based on a hash function, such as MD5 or SHA-1.
Partitioning can improve query performance...read more
Q46. What is structuring or round dollar , or what is three type money laundering … what is threshold … country based questions they can ask
Q47. Management types in snow and in how many days can join
The question is unclear and requires clarification.
The question needs to be rephrased for better understanding.
It is unclear what is meant by 'management types in snow'.
The number of days it takes to join is also unclear.
Further clarification is needed to provide an accurate answer.
Q48. Technical Round: Different types of wait with differences between explicit and fluent wait
Explicit and fluent wait are types of wait used in test automation to handle synchronization issues.
Explicit wait is used to wait for a specific condition to occur before proceeding further in the test script.
Fluent wait is used to wait for a condition with a defined polling frequency and timeout duration.
Explicit wait provides more control and flexibility as it allows specifying the condition and the maximum wait time.
Fluent wait provides a more fluent and readable way of wa...read more
Q49. How will you check if a pod in ReplicaSet went down or failed and what was the reason for the same?
To check if a pod in ReplicaSet went down or failed, monitor the pod status, logs, and events.
Monitor the pod status using kubectl get pods command
Check the pod logs for any error messages using kubectl logs command
Review the events related to the pod using kubectl describe pod command
Set up alerts or notifications for pod failures using monitoring tools like Prometheus or Grafana
Q50. Which methodology I have worked on like Agile or Waterfall or both?
I have worked on both Agile and Waterfall methodologies.
I have experience in Agile methodologies such as Scrum and Kanban.
I have also worked on Waterfall methodology in projects that require a more structured approach.
I understand the strengths and weaknesses of both methodologies and can adapt to the project's needs.
For example, I used Agile methodology in a project that required frequent changes and iterations, while I used Waterfall methodology in a project that had a clea...read more
Q51. Describe the entire POC Process you followed while migrating your SAP On-Premise System to the Google Cloud Platform. ( Technical Specs and Errors Encountered). Observations regarding the Sizing and Output.
Outlined POC process for migrating SAP On-Premise System to Google Cloud Platform
Analyzed current system and determined necessary resources for migration
Created a test environment to ensure compatibility and identify errors
Used Cloud Migration for SAP tool to migrate data and configurations
Encountered errors with network connectivity and resolved through troubleshooting
Monitored system performance and made necessary adjustments for optimal output
Q52. Big data Hadoop architecture and HDFS commands to copy and list files in hdfs spark architecture and Transformation and Action question what happen when we submit spark program spark dataframe coding question s...
read moreQuestions on big data, Hadoop, Spark, Scala, Git, project and Agile.
Hadoop architecture and HDFS commands for copying and listing files in HDFS
Spark architecture and Transformation and Action question
What happens when we submit a Spark program
Spark DataFrame coding question
Scala basic program on List
Git and Github
Project-related question
Agile-related
Q53. Difference between SOAP & REST, remove and collapse context, file and sftp?
SOAP is a protocol for exchanging structured information, while REST is an architectural style for building web services.
SOAP uses XML to encode messages, while REST uses a variety of formats such as JSON, XML, or plain text.
SOAP is more rigid and requires more bandwidth, while REST is more flexible and lightweight.
Remove context is used to remove the context of a message, while collapse context is used to collapse the context of a message.
File is used to transfer files betwe...read more
Q54. How to check whether a file in empty or not using JCL.
Checking if a file is empty using JCL
Use the IDCAMS utility to check the file's status
Check the file's record count using the LISTCAT command
Use the SORT utility to check if the file has any records
Use the DFSORT utility to check if the file has any records
Q55. 3) Difference between cache and persistent storage
Cache is temporary storage used to speed up access to frequently accessed data. Persistent storage is permanent storage used to store data even after power loss.
Cache is faster but smaller than persistent storage
Cache is volatile and data is lost when power is lost
Persistent storage is non-volatile and data is retained even after power loss
Examples of cache include CPU cache, browser cache, and CDN cache
Examples of persistent storage include hard disk drives, solid-state driv...read more
Q56. what you should see in the show interface type/member/module/number?
The show interface command displays the status and statistics of a network interface.
Displays the interface type, member, module, and number
Shows the current status of the interface (up or down)
Displays the number of packets transmitted and received
Shows the number of errors and discards
Displays the speed and duplex settings of the interface
Q57. What is network and how many type are ther?
A network is a group of interconnected devices that communicate with each other. There are three types of networks: LAN, WAN, and MAN.
A LAN (Local Area Network) is a network that covers a small area, like a home or office.
A WAN (Wide Area Network) is a network that covers a large area, like a city or country.
A MAN (Metropolitan Area Network) is a network that covers a larger area than a LAN but smaller than a WAN, like a city.
Other types of networks include WLAN (Wireless Loc...read more
Q58. How to you prepare EMI and balance sheet end of the month or year reporting how to prepare
To prepare EMI and balance sheet end of the month or year reporting, follow these steps:
Ensure all transactions are recorded accurately and completely
Reconcile bank statements and other accounts
Prepare adjusting entries for accruals and deferrals
Organize accounts into appropriate categories for the balance sheet
Calculate EMI based on loan amount, interest rate, and term
Verify accuracy of all calculations
Prepare financial statements and reports
Review and analyze financial data...read more
Q59. What is the advantage of SLT Replication compared to other replication Methods?
SLT Replication offers real-time data replication with minimal system impact.
SLT Replication allows for real-time data replication from multiple sources to a single target system.
It offers minimal system impact as it uses trigger-based replication instead of full table scans.
SLT Replication also provides data transformation capabilities and supports heterogeneous data replication.
Compared to other replication methods, SLT Replication is more efficient and cost-effective.
For e...read more
Q60. Have you worked on CDS, steps to implement CDS view?
Yes, I have worked on CDS views and implemented them in SAP systems.
Define CDS view in ABAP Dictionary using DDL source code
Activate CDS view using ABAP Development Tools (ADT)
Use CDS view in ABAP programs for data retrieval and manipulation
Q61. How do you monitor your application and what are the configurations?
Application monitoring is done through various tools and configurations.
We use tools like Nagios, Zabbix, and Prometheus for monitoring.
We configure alerts for critical events and set up dashboards for easy visualization.
We also use log aggregation tools like ELK stack to monitor application logs.
We monitor system resources like CPU, memory, and disk usage.
We perform load testing to identify performance bottlenecks.
We use APM tools like New Relic and AppDynamics to monitor ap...read more
Q62. What's the ad value of bgp and bgp States?
BGP (Border Gateway Protocol) is a routing protocol used in internet networks. It provides scalability, redundancy, and policy control.
BGP is used to exchange routing information between different autonomous systems (AS)
It allows for efficient routing decisions based on policies and network conditions
BGP states represent the different stages of establishing and maintaining BGP peering sessions
Examples of BGP states include Idle, Connect, Active, OpenSent, OpenConfirm, Establi...read more
Q63. How do you calculate the cost implications when proposing an architecture? What are the steps involved in migrating an existing application to Cloud?
Q64. What are modules in Terraform, share your screen and write module
Modules in Terraform are reusable components that allow you to encapsulate and organize your infrastructure code.
Modules help in breaking down complex infrastructure into smaller, manageable components
They promote reusability and maintainability of code
Modules can be shared and used across different projects
Example: Creating a module for provisioning a virtual machine in Azure
Q65. How would you provide security to your credentials while using Terraform
Use encrypted variables, limit access to credentials, and utilize secure storage solutions.
Encrypt sensitive variables using tools like Vault or AWS KMS
Limit access to credentials by using least privilege principles
Store credentials securely in a password manager or key vault
Avoid hardcoding credentials in Terraform configuration files
Q66. If you are using CICD define your stages and issues you faced
CICD stages include build, test, deploy, and monitor. Common issues include integration challenges and pipeline failures.
Stages: Build, Test, Deploy, Monitor
Issues: Integration challenges, Pipeline failures
Example: Integration challenges with third-party tools delaying deployment
Q67. Will you be able to work if given any type of work like either DevOps or only Cloud or only Development?
Yes, I am capable of working in various roles such as DevOps, Cloud, and Development.
I have experience and skills in DevOps practices such as automation, CI/CD, and infrastructure as code.
I am proficient in cloud technologies like AWS, Azure, or Google Cloud Platform.
I have a strong background in software development with expertise in languages like Python, Java, or JavaScript.
Q68. Which server and version is being used and how to configure the data source in WebLogic server
The server being used is WebLogic and the version is not specified. Data source can be configured through the console or configuration files.
WebLogic server is being used
Version is not specified
Data source can be configured through console or configuration files
Q69. Statement vs prepared statements(whats the use of pstmts over stmts), why microservice when the same can happen in monolithic(Not normal differences expected something else), how Rest API will work (internal pr...
read morePrepared statements are precompiled SQL statements that can improve performance and security. Microservices offer scalability and flexibility over monolithic architecture. REST API works by using HTTP methods to interact with resources.
Prepared statements are precompiled SQL statements that can be reused multiple times, improving performance by reducing database load and preventing SQL injection attacks.
Microservices allow for independent deployment, scalability, and flexibil...read more
Q70. From which scenario we can identify that HANA Database has an issue which is caused by Memory?
HANA Database memory issue identification scenario
High memory consumption by HANA processes
Frequent garbage collection
Slow query performance
Out of memory errors in HANA logs
Memory-related alerts in HANA monitoring tools
Q71. Difference between standard order and rush order? How the delivery is created immediately in rush order, where are the controls?
Standard orders have regular delivery times while rush orders require immediate delivery. Controls for rush orders are typically set in the system.
Standard orders have regular delivery times based on the company's standard processing and shipping times.
Rush orders are prioritized for immediate delivery, often with expedited processing and shipping.
Controls for rush orders are usually set in the system, such as flagging the order as a rush order or assigning it to a specific t...read more
Q72. What will happen if I won't maintain account modifier?
Not maintaining account modifier can lead to incorrect financial reporting and accounting errors.
Account modifier is used to differentiate between different types of transactions in financial reporting.
If not maintained, it can lead to incorrect financial statements and accounting errors.
For example, if a company has multiple revenue streams, not maintaining account modifier can lead to revenue from different streams being reported together, leading to incorrect financial ana...read more
Q73. Name the service which is required for time sync and how to configure it?
The service required for time sync is Network Time Protocol (NTP).
NTP is a protocol used to synchronize the clocks of computers over a network.
It ensures accurate timekeeping and consistency across systems.
To configure NTP, the administrator needs to specify NTP servers in the system's configuration file.
Examples of NTP servers are time.google.com, pool.ntp.org, etc.
The system periodically queries the NTP servers to adjust its clock accordingly.
Q74. When to use and not to use NoSQL databases such as Redis, Cassandra and MongoDB.
NoSQL databases like Redis, Cassandra, and MongoDB should be used when dealing with large amounts of unstructured data.
Use NoSQL databases when dealing with large amounts of unstructured data
Use NoSQL databases when scalability is a concern
Use NoSQL databases when flexibility is needed
Do not use NoSQL databases when dealing with structured data
Do not use NoSQL databases when ACID compliance is required
Q75. What is code inspector , what is assistance class
Code Inspector is a tool to check code quality. Assistance class is a reusable class to provide common functionality.
Code Inspector checks for syntax errors, performance issues, security vulnerabilities, and adherence to coding standards.
Assistance class provides reusable code for common functionality like date and time calculations, string operations, and database access.
Assistance class can be used in multiple programs, reducing code duplication and improving maintainabilit...read more
Q76. What is the HANA Performance Improvement that you have done?
Implemented HANA table partitioning and index optimization resulting in 50% faster query performance.
Implemented table partitioning based on frequently accessed data
Optimized indexes to reduce data retrieval time
Tuned HANA parameters for better memory allocation
Reduced data footprint by archiving historical data
Implemented data compression to reduce storage requirements
Q77. what are the optimization techniques used in your project
Optimization techniques used in project
Caching
Parallel processing
Compression
Indexing
Query optimization
Q78. What is a role of support engineer
A support engineer is responsible for providing technical assistance and resolving issues related to software or hardware systems.
Providing technical support to customers or end-users
Troubleshooting and resolving software or hardware issues
Installing, configuring, and maintaining systems
Monitoring system performance and identifying potential problems
Collaborating with development teams to address bugs or enhancements
Documenting support processes and creating knowledge base ar...read more
Q79. What is the range of private ip address?
The range of private IP addresses is defined by three blocks: 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255.
Private IP addresses are used within private networks and are not routable on the internet.
The three blocks of private IP addresses are reserved for use in local area networks (LANs) and are not unique globally.
Private IP addresses allow organizations to have multiple devices with the same IP addresses within their private ...read more
Q80. What is purchase requestition ?
A purchase requisition is a document used to request goods or services from a supplier.
It is a formal request for procurement of goods or services.
It includes details such as quantity, description, and estimated cost.
It is typically initiated by a department or individual within an organization.
It is used to obtain approval for the purchase before it is made.
It is an important part of the procurement process.
Example: A department within a company needs to purchase new compute...read more
Q81. SQL query to find max salary in different areas of employee
Use SQL query to find max salary in different areas of employee
Use GROUP BY clause to group employees by area
Use MAX() function to find the maximum salary in each group
Combine GROUP BY and MAX() to get the desired result
Q82. How to find dynamic element in a page
Dynamic elements can be found using various methods such as inspecting the page source code, using browser developer tools, or using automation tools.
Inspect the page source code to identify dynamic elements that have unique attributes or IDs
Use browser developer tools to inspect the page and identify dynamic elements that change based on user interactions
Use automation tools such as Selenium to locate dynamic elements by using wait conditions or element locators
Examples of d...read more
Q83. What is the Docker? what is the best practice of writing a docker file?
Docker is a containerization platform that allows developers to package and deploy applications in a portable manner.
Dockerfile is a script that contains instructions to build a Docker image
Best practices include keeping the image size small, using a single process per container, and using environment variables for configuration
Use multi-stage builds to reduce image size and improve security
Avoid running containers as root to minimize security risks
Regularly update base image...read more
Q84. What are different security patterns that can be implemented on soap and rest services?
Security patterns for SOAP and REST services
Use HTTPS for secure communication
Implement authentication and authorization mechanisms
Use message encryption and decryption
Implement input validation and output encoding
Use rate limiting to prevent DoS attacks
Implement logging and monitoring for security incidents
Use OAuth for secure API access
Implement CORS to restrict access from unauthorized domains
Q85. How to validate the po ?
To validate a PO, check for accuracy, completeness, and compliance with procurement policies.
Verify that the PO number matches the one in the system
Ensure that the vendor information is correct
Check that the items ordered match the specifications and quantities requested
Confirm that the prices are accurate and in line with the budget
Ensure that the PO is authorized and approved by the appropriate personnel
Check that the delivery date and location are correct
Verify that the te...read more
Q86. CI-CD Flow and how we have implemented in our project
CI-CD flow is implemented in our project for continuous integration and delivery of software.
We use Jenkins as our CI/CD tool.
Our code is stored in Git repository and is automatically built and tested on every commit.
We have multiple environments for testing and deployment, including staging and production.
We use Docker containers for easy deployment and scalability.
Our CI/CD pipeline includes automated testing, code analysis, and deployment.
We have implemented blue-green dep...read more
Q87. Router components service angular performance optimization how to scale app, security
Optimizing Angular app performance and security with router components and services
Use lazy loading to improve performance
Implement caching for frequently accessed data
Use Angular Universal for server-side rendering
Implement HTTPS and secure authentication for security
Use guards and interceptors to protect routes and prevent unauthorized access
Q88. How do you create a custom directive? Give one example.
Creating a custom directive involves defining a new behavior for an HTML element.
Use the AngularJS module method to create a new module
Define the directive using the directive method
Specify the directive's behavior using the link function
Add the directive to an HTML element using the directive's name
Example: creating a directive to display a tooltip on hover
Q89. What is DNS,DHCP,IP address,RJ-45?
DNS is a system that translates domain names into IP addresses. DHCP is a protocol for assigning IP addresses. IP address is a unique identifier for devices. RJ-45 is a type of connector used for Ethernet cables.
DNS translates domain names (e.g., www.example.com) into IP addresses (e.g., 192.168.1.1).
DHCP is a protocol that automatically assigns IP addresses to devices on a network.
An IP address is a numerical label assigned to each device connected to a computer network.
RJ-4...read more
Q90. What do you know about Forms and Templates and its use in workflow and webreports
Forms and Templates are used in workflow and web reports to standardize data input and presentation.
Forms are used to collect data in a structured manner, often with predefined fields and formats
Templates are pre-designed layouts for presenting data in a consistent way
Forms and Templates help streamline processes, ensure data consistency, and improve reporting accuracy
In workflow management, Forms can be used to gather input from users at different stages of a process
Web repo...read more
Q91. 1) Project Architecture 2) Complex job handles in project 3) Types of lookup 4) SCD -2 implementation in datastage 5) sql - analytical functions,scenario based question 6) Unix - SED/GREP command
The interview questions cover project architecture, complex job handling, lookup types, SCD-2 implementation, SQL analytical functions, and Unix commands.
Project architecture involves designing the overall structure of a data project.
Complex job handling refers to managing intricate data processing tasks within a project.
Lookup types include exact match, range match, and fuzzy match.
SCD-2 implementation in DataStage involves capturing historical changes in data.
SQL analytical...read more
Q92. 1. what do we use spring boot 2. Microservice design pattern
Spring Boot is used for developing stand-alone, production-grade Spring-based applications.
Spring Boot simplifies the development process by providing auto-configuration and opinionated defaults.
It allows developers to quickly create and deploy applications with minimal configuration.
Spring Boot provides a range of features like embedded servers, metrics, health checks, and security.
It supports various technologies and frameworks, making it easy to integrate with existing sys...read more
Q93. What are the troubleshooting you will do when you are not able to connect to a server?
I will check network connectivity, firewall settings, and server status.
Check if the server is powered on and running
Verify network connectivity between the client and server
Check firewall settings to ensure the server is not blocked
Check if the server is reachable via ping or telnet
Check server logs for any errors or issues
Verify DNS settings are correct
Q94. Cyclomatic Complexity in Salesforce
Cyclomatic Complexity is a software metric that measures the complexity of a program based on its control flow.
Cyclomatic Complexity is calculated by counting the number of decision points in a program.
It helps in identifying complex code that may be difficult to understand, test, and maintain.
Higher Cyclomatic Complexity indicates higher risk and potential for bugs.
Reducing Cyclomatic Complexity can improve code quality and maintainability.
Salesforce provides tools like PMD ...read more
Q95. Whether using microservice or not. Why microservice
Microservices offer scalability, flexibility, and faster deployment.
Microservices allow for independent deployment and scaling of individual components
They enable faster development and deployment cycles
They promote flexibility and agility in software development
Examples include Netflix, Amazon, and Uber
Q96. How do you prepare of ledger posting
Ledger posting involves recording financial transactions in the appropriate accounts.
Identify the accounts affected by the transaction
Determine the type of account (asset, liability, equity, revenue, expense)
Debit or credit the appropriate account based on the transaction type
Record the transaction in the general ledger
Ensure accuracy and completeness of the posting
Q97. Explain the entire process of your DevOps project? what are the components of Kubernetes?
The DevOps project involves continuous integration, delivery, and deployment of software. Kubernetes components include pods, services, deployments, and namespaces.
The DevOps process starts with developers committing code to a version control system like Git.
The code is then built and tested using continuous integration tools like Jenkins.
The built code is packaged into containers using tools like Docker.
The containers are deployed to a Kubernetes cluster using tools like kub...read more
Q98. Spring Security & How Security has been achieved in my application
Spring Security is used for authentication and authorization in the application.
Spring Security provides a framework for securing web applications.
It uses various authentication and authorization mechanisms such as form-based, basic, and OAuth2.
In our application, we have used form-based authentication with user credentials stored in a database.
We have also implemented role-based authorization to restrict access to certain resources.
Spring Security also provides features like...read more
Q99. Give example of how high level item category is used st document level
High level item category is used at document level to group similar items together for easier tracking and reporting.
High level item category can be used to classify items based on their type, purpose, or department.
It helps in organizing and grouping items for better visibility and analysis.
For example, in a procurement document, high level item category can be used to group all office supplies together for easier tracking and reporting.
Q100. Who creats pr and how ?
PR is created by the PR department or agency, in collaboration with the relevant stakeholders.
PR department or agency is responsible for creating PR
Collaboration with relevant stakeholders is necessary
PR creation involves identifying target audience, crafting key messages, and selecting appropriate channels
PR can be created for various purposes such as brand awareness, crisis management, product launches, etc.
More about working at IBM
Top HR Questions asked in FOX Solutions
Interview Process at FOX Solutions
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month