IBM
400+ Maren Solutions Interview Questions and Answers
Q101. How many host will be in /29?
A /29 subnet has 6 usable host addresses.
A /29 subnet has a subnet mask of 255.255.255.248.
The subnet mask leaves 3 bits for host addresses.
2^3 = 8, but 2 addresses are reserved for network and broadcast.
Therefore, a /29 subnet has 6 usable host addresses.
Q102. Q2. What is a Gateway and full Explanation. Ans. Gateway is a hardware device that is used to connect two dissimilar type of network. It allows us to send and receive data through the internet event it is LAN n...
read moreA gateway is a hardware device that connects two dissimilar types of networks, allowing data to be sent and received through the internet even if it is a LAN network.
Gateway acts as an entry and exit point for data traffic between networks
It translates data between different network protocols
Examples include routers and firewalls that connect a local network to the internet
Q103. What is the difference between domain and work group?
Domain is a centralized network where a server controls access and security. Workgroup is a decentralized network where each computer has its own security settings.
Domain is a centralized network where a server controls access and security.
Workgroup is a decentralized network where each computer has its own security settings.
Domain is used in larger organizations with many users and computers.
Workgroup is used in smaller organizations with fewer users and computers.
Domain all...read more
Q104. How can you can analyse ur responsibilities as a Business Analyst.
As a Business Analyst, I can analyze my responsibilities by identifying key stakeholders, gathering requirements, and creating solutions.
Identify key stakeholders and their needs
Gather and document requirements
Analyze data and create solutions
Collaborate with cross-functional teams
Ensure project goals are met
Continuously improve processes
Communicate effectively with stakeholders
Q105. Types of network?
There are several types of networks, including LAN, WAN, MAN, WLAN, and PAN.
Local Area Network (LAN) is a network that covers a small area, such as an office or a building.
Wide Area Network (WAN) is a network that covers a large geographical area, such as multiple cities or countries.
Metropolitan Area Network (MAN) is a network that covers a larger area than a LAN but smaller than a WAN, typically within a city.
Wireless Local Area Network (WLAN) is a LAN that uses wireless co...read more
Q106. Q4 KPI and SLA/TAT? Q5 PTP Cycle? Q6 SOP/DTP? Q7 senerio questions? Q8 Accounting questions - golden rules, types of accounts, journal entries, depreciation etc) Q9 80*20 Principle?
The interview questions cover KPIs, PTP cycle, SOP/DTP, scenario questions, accounting principles, and the 80/20 principle.
Q4: Discuss key performance indicators and service level agreements/turnaround times.
Q5: Explain the procure-to-pay cycle.
Q6: Describe standard operating procedures and document-to-process mapping.
Q7: Answer scenario-based questions related to financial analysis.
Q8: Discuss accounting principles such as the golden rules, types of accounts, journal entries...read more
Q107. Order Of Execution in Salesforce related Scenarios
Order of execution in Salesforce determines the sequence in which various operations are performed.
The order of execution is as follows: Validation rules, before triggers, after triggers, assignment rules, auto-response rules, workflow rules, processes, escalation rules, and finally, the commit.
Validation rules are checked first to ensure data integrity.
Before triggers are executed before the record is saved to the database.
After triggers are executed after the record is save...read more
Q108. How do you negotiate with OEM.?
Negotiate with OEM by understanding their needs, building relationships, and finding win-win solutions.
Research the OEM's business and industry to understand their needs and priorities
Build a relationship with the OEM based on trust and mutual respect
Identify areas of common interest and work towards win-win solutions
Be prepared to compromise and find creative solutions to overcome obstacles
Communicate clearly and effectively throughout the negotiation process
Consider the lon...read more
Q109. What is the keyword for function? What project I did in my college final year?
The keyword for function in programming is 'function'.
The keyword 'function' is used to define a function in programming languages like JavaScript.
Functions are blocks of code that perform a specific task and can be called multiple times within a program.
Q110. Pre-requisite for IDoc config at ECC and PO end?
The pre-requisite for IDoc config at ECC and PO end is to have the necessary RFC destinations and ports configured.
RFC destinations must be created in both ECC and PO systems
Ports must be configured in both systems
Partner profiles must be maintained in both systems
IDoc types and message types must be defined and linked to the appropriate RFC destinations and ports
The necessary authorizations must be assigned to the user performing the configuration
Q111. what is the difference between nw9 and nw19 version?
NW9 and NW19 are different versions of NetWorker software with varying features and capabilities.
NW19 has improved backup and recovery performance compared to NW9.
NW19 supports more operating systems and applications than NW9.
NW19 has enhanced security features such as TLS 1.2 support.
NW19 has a new web-based user interface for easier management.
NW19 has a new feature called CloudBoost for cloud-based data protection.
NW9 is an older version and may not be supported by newer h...read more
Q112. How can you handle Client Requirements and What is SRS?
Handling client requirements involves understanding their needs and translating them into a Software Requirements Specification (SRS).
Listen actively to the client's needs and ask clarifying questions
Document the requirements in a clear and concise manner
Ensure that the requirements are feasible and align with the project goals
Collaborate with the development team to ensure that the requirements are implemented correctly
Regularly communicate with the client to ensure that the...read more
Q113. Briefly describe the architectural methods followed to prepare a feasible solution for any client's requirements?
Architectural methods involve understanding client requirements, analyzing site conditions, creating design concepts, and refining the solution.
Understand client's needs and preferences
Analyze site conditions and constraints
Create design concepts and present to client
Refine the solution based on feedback
Consider budget and timeline constraints
Collaborate with engineers and contractors
Ensure compliance with building codes and regulations
Q114. How would you implement SCD TYPE 2 IN INFORMATICA?
Implementing SCD Type 2 in Informatica involves using Slowly Changing Dimension transformations and mapping variables.
Use Slowly Changing Dimension (SCD) transformations in Informatica to track historical changes in data.
Create mapping variables to keep track of effective start and end dates for each record.
Use Update Strategy transformations to handle inserts, updates, and deletes in the target table.
Implement Type 2 SCD by inserting new records with updated data and marking...read more
Q115. Have you ever done a HANA Database Refresh?
Yes, I have experience in performing HANA database refresh.
I have performed HANA database refresh for various clients during my tenure as a SAP Basis consultant.
I am well-versed with the process of taking a backup of the source database and restoring it on the target system.
I have also worked on post-refresh activities such as updating system configurations and performing system checks to ensure data consistency.
One of the recent examples of my work includes performing a HANA...read more
Q116. Any knowledge on windows servers, what do you know about patching windows, types of servers you know.
I have knowledge on patching Windows servers and different types of servers.
I am familiar with the process of patching Windows servers to ensure they are up to date with the latest security updates and bug fixes.
I am aware of different types of Windows servers such as file servers, web servers, domain controllers, and application servers.
I understand the importance of regularly patching servers to protect against vulnerabilities and ensure optimal performance.
Q117. How spring boot is difference from spring?
Spring Boot is a framework that simplifies the configuration and deployment of Spring-based applications.
Spring Boot provides a pre-configured environment for building and running Spring applications.
It eliminates the need for XML configuration files and reduces boilerplate code.
It includes an embedded web server and supports various data sources and messaging systems.
Example: Spring Boot can be used to quickly create a RESTful web service with minimal configuration.
Example: ...read more
Q118. What is c? How it's function work
C is a programming language used for system programming, embedded systems, and game development.
C was developed by Dennis Ritchie at Bell Labs in 1972.
It is a compiled language, meaning that the code is translated into machine-readable instructions before execution.
C is known for its efficiency and low-level control over hardware, making it a popular choice for operating systems and device drivers.
C functions are defined with a return type, name, and parameters, and can be ca...read more
Q119. How much confident I have to work in S4 HANA implementation project in configuration level.
I am highly confident in working on S4 HANA implementation projects at the configuration level.
I have extensive experience in SAP SD configuration and have successfully completed multiple implementation projects.
I have undergone training specifically for S4 HANA and have hands-on experience with the system.
I am familiar with the new features and functionalities of S4 HANA and can effectively configure them to meet business requirements.
Q120. Difference between finance and accounts, What is Ledger creation, Cash flow and fund flow,What was your last company work What is GST and taxation
Finance and accounts are related but distinct fields. Ledger creation is the process of recording financial transactions. Cash flow and fund flow are tools used to analyze the movement of money in a business. GST is a tax system in India.
Finance deals with the management of money and investments, while accounts focus on recording and analyzing financial transactions.
Ledger creation involves setting up accounts to record financial transactions, such as sales, purchases, and ex...read more
Q121. What is the difference between share point and one drive?
SharePoint is a collaboration platform while OneDrive is a personal cloud storage service.
SharePoint is used for team collaboration and document management.
OneDrive is used for personal file storage and sharing.
SharePoint allows multiple users to work on the same document simultaneously.
OneDrive allows users to access their files from anywhere with an internet connection.
SharePoint is typically used by organizations while OneDrive is used by individuals.
SharePoint offers more...read more
Q122. What is the difference between invoice and credit note
An invoice is a bill for goods or services provided, while a credit note is a document issued to reduce the amount owed on an invoice.
An invoice is issued when goods or services are sold or provided to a customer.
An invoice shows the amount owed by the customer to the seller or service provider.
A credit note is issued when there is a need to reduce the amount owed on an invoice.
A credit note can be issued for various reasons, such as returns, discounts, or errors in the origi...read more
Q123. What is ticketing tool
A ticketing tool is a software application used to track and manage customer support requests or issues.
Ticketing tools help in organizing and prioritizing customer support tickets.
They provide a centralized platform for communication and collaboration between support teams and customers.
Ticketing tools often include features like ticket assignment, status tracking, and reporting.
Examples of popular ticketing tools include Jira Service Desk, Zendesk, and Freshdesk.
Q124. Explain how you will transform digitally for our client ?
We will implement a comprehensive digital strategy that includes automation, data analytics, and cloud computing.
Develop a roadmap for digital transformation
Identify key areas for automation and implement appropriate tools
Leverage data analytics to gain insights and improve decision-making
Migrate to cloud-based infrastructure for scalability and cost savings
Train employees on new technologies and processes
Continuously monitor and optimize digital strategy
Q125. Q1 What is transition? Q2 T - code used for payment and invoice processing? Q3 what the process you follow to check duplicity before proceeding further for payment?
Transition refers to the process of moving from one state or condition to another.
Transition can occur in various contexts, such as organizational change, personal growth, or project management.
In finance, transition may refer to the process of moving from one accounting system to another.
T-code FB60 is commonly used for invoice processing in SAP.
To check for duplicity before payment, a financial analyst may use tools such as duplicate invoice reports or vendor master data.
Ot...read more
Q126. Explain VPC, NAT Gateway, difference between NACL and SG
VPC is a virtual private cloud that allows you to create isolated networks, NAT Gateway enables instances in a private subnet to connect to the internet, NACL controls inbound and outbound traffic at the subnet level, SG controls traffic at the instance level.
VPC is a virtual network in the cloud that you can define and customize, providing a secure environment for your resources.
NAT Gateway allows instances in a private subnet to access the internet while remaining private.
N...read more
Q127. What is purchase order ?
A purchase order is a document issued by a buyer to a seller, indicating types, quantities, and agreed prices for products or services.
It is a legal document that outlines the details of a purchase agreement between a buyer and a seller.
It includes information such as the product or service being purchased, the quantity, the agreed-upon price, and delivery date.
It serves as a contract between the buyer and seller, ensuring that both parties are aware of the terms of the agree...read more
Q128. What is the difference between private ip and public up address
Q129. Item categories for return orders, consignment processes and their schedule lines
Item categories for return orders, consignment processes, and their schedule lines
Return orders typically fall under categories like damaged goods, wrong item received, or change of mind
Consignment processes may involve categories such as delivery scheduling, inventory management, and payment terms
Schedule lines for return orders and consignment processes help track timelines for actions and deliveries
Q130. What is difference between snowflake schema and Star Schema?
Q131. What is your experience with technical discussions related to specific modules?
I have extensive experience leading technical discussions on specific modules.
Led discussions on customizing SAP modules to meet client requirements
Collaborated with developers to troubleshoot technical issues within modules
Provided training to team members on module functionalities and best practices
Participated in module upgrade projects to ensure smooth transition and minimal downtime
Q132. Explain how you were managing SCM and what tools were used?
I managed SCM using a combination of tools and strategies.
I used a variety of software tools to manage inventory, track shipments, and analyze data.
I also implemented strategies such as just-in-time inventory management and lean manufacturing.
Some of the tools I used include SAP, Oracle, and JDA Software.
I regularly communicated with suppliers and logistics partners to ensure timely delivery of goods.
I monitored key performance indicators such as inventory turnover and on-tim...read more
Q133. What do you understand by maximo tool ..could you explain in practical way .how to use it
Q134. 3.What if two thread tries to modify the collection? ConcurrentModificationException.
Q135. What is microprocessor and how its work
A microprocessor is a small computer chip that performs arithmetic and logic operations.
Microprocessors are the heart of modern computers and electronic devices.
They are made up of millions of transistors that switch on and off to perform calculations.
Microprocessors fetch instructions from memory, decode them, and execute them.
Examples of microprocessors include Intel's Pentium and AMD's Ryzen processors.
Microprocessors are used in a wide range of applications, from smartpho...read more
Q136. What is micro control and how its work
Micro control is a type of control system that uses microprocessors to control various devices and processes.
Micro control systems are used in various applications such as home automation, industrial automation, and robotics.
They are designed to be compact and efficient, with low power consumption and high processing power.
Micro control systems can be programmed using various programming languages such as C, C++, and assembly language.
They can be used to control various devic...read more
Q137. what is primary key and foreign key
Primary key uniquely identifies each record in a table, while foreign key establishes a link between two tables.
Primary key ensures data integrity by enforcing uniqueness of each record
Foreign key establishes a relationship between tables by referencing the primary key of another table
Primary key can be a single column or a combination of columns
Foreign key helps maintain referential integrity in a database
Q138. Embedded systems and how its work
Embedded systems are computer systems designed to perform specific tasks within a larger system.
Embedded systems are often used in devices such as medical equipment, automobiles, and home appliances.
They typically have limited processing power and memory compared to general-purpose computers.
They are designed to be reliable and efficient, often running on low-power processors.
Programming languages commonly used for embedded systems include C and assembly language.
Embedded sys...read more
Q139. How to protect site from sapm? Multi site how to create?
To protect a site from spam, implement CAPTCHA, use spam filters, validate user input, and monitor site activity. To create a multi-site, use a content management system with multi-site capabilities.
Implement CAPTCHA to prevent automated spam submissions
Use spam filters to detect and block spam content
Validate user input to ensure data integrity and prevent malicious code injection
Monitor site activity for suspicious behavior and patterns
For creating a multi-site, use a conte...read more
Q140. 4 - How to read data from excel
To read data from Excel, we can use libraries like Apache POI or OpenCSV.
Create a FileInputStream object to read the Excel file
Create a Workbook object using the FileInputStream object
Get the sheet from the Workbook object using sheet name or index
Iterate through rows and columns to read data
Close the Workbook and FileInputStream objects
Q141. 1.What are the fields in /etc/fstab 2.what happens if we us 'l' instead of 'L' in lvextend command.
Answering questions related to /etc/fstab fields and lvextend command.
Fields in /etc/fstab are device, mount point, file system type, options, dump frequency and file system check order
Using 'l' instead of 'L' in lvextend command will result in an error as 'l' is not a valid option
lvextend command is used to extend the size of a logical volume
The /etc/fstab file is used to define how file systems are mounted and accessed during system startup
Q142. RICEW component and complete oracle P2P and O2C Cycle.
RICEW component and Oracle P2P and O2C Cycle
RICEW stands for Reports, Interfaces, Conversions, Enhancements, and Workflows
Oracle P2P cycle includes requisition, purchase order, receipt, and invoice processing
Oracle O2C cycle includes order entry, order fulfillment, shipping, and invoicing
RICEW components can be used to enhance and customize the P2P and O2C cycles
Q143. RAC architecture,startup and shutdown process steps in RAC, migration of spfile,asm migration
Answering questions on RAC architecture, startup and shutdown process, spfile and ASM migration
RAC architecture involves multiple nodes sharing a common storage and network infrastructure
Startup process involves starting the Oracle Clusterware stack, starting the database instances, and mounting the database
Shutdown process involves dismounting the database, stopping the database instances, and stopping the Oracle Clusterware stack
Migration of spfile involves copying the spfi...read more
Q144. Cloud readiness assessments and strategy. Migration strategy for multi - cloud environments.
Cloud readiness assessments and strategy involve evaluating an organization's ability to adopt cloud technology and developing a plan for multi-cloud migration.
Assess current IT infrastructure and identify areas for improvement
Determine business goals and objectives for cloud adoption
Develop a comprehensive cloud migration strategy
Consider security, compliance, and data management requirements
Evaluate different cloud providers and services
Implement a phased approach to migrat...read more
Q145. What are Rest services and Soap services?
Rest and Soap are web services used for communication between systems.
Rest is an architectural style that uses HTTP protocol for communication.
Soap is a protocol that uses XML for communication.
Rest is lightweight and easy to use, while Soap is more complex.
Rest is used for mobile and web applications, while Soap is used for enterprise applications.
Examples of Rest services include Twitter API and Google Maps API, while examples of Soap services include Amazon Web Services an...read more
Q146. Why we use redux. Explain its principles?
Redux is a predictable state container for JavaScript apps.
Redux helps manage the state of an application in a predictable way
It provides a single source of truth for the state of the application
Redux follows the principles of immutability and pure functions
It allows for easy debugging and time-travel debugging
Redux can be used with any UI library or framework
Example: A shopping cart application can use Redux to manage the state of the cart
Q147. How do you justify that router is active transformation?
Router is an active transformation as it can change the number of rows that pass through it based on conditions.
Router transformation is used to route data from one source to multiple targets based on conditions.
It can change the number of rows that pass through it based on the conditions specified.
It evaluates each row against the conditions and sends the row to the appropriate output group.
It is an active transformation as it changes the number of rows that pass through it....read more
Q148. Tell me about RPA Journey phases? Difference between AA 2019 and 360
Q149. What is the use of condition record?
Condition record is used to define pricing and discounts for customers and materials.
Condition record is used in SAP FICO module.
It is used to define pricing and discounts for customers and materials.
It helps in maintaining the consistency of pricing and discounts across the organization.
It can be used to define different pricing and discounts for different customers and materials.
Examples of condition records include pricing for a specific customer or material, discounts for...read more
Q150. What is meant by impairment of assets?
Impairment of assets refers to a decrease in the value of a company's assets.
Impairment occurs when the carrying value of an asset exceeds its recoverable amount.
It is recognized as a loss on the company's income statement.
Examples include a decline in market value, physical damage, or obsolescence.
Impairment testing is required annually for goodwill and indefinite-lived intangible assets.
Impairment can have a significant impact on a company's financial statements and stock p...read more
Q151. What PCA, Decision tree and computer vision
PCA is a dimensionality reduction technique, decision tree is a classification algorithm, and computer vision is a field of study focused on enabling computers to interpret and understand visual information.
PCA is used to reduce the number of variables in a dataset while retaining the most important information.
Decision trees are used to classify data based on a set of rules and conditions.
Computer vision involves using algorithms and techniques to enable computers to interpr...read more
Q152. What is the 17th step in pricing procedure
The 17th step in pricing procedure is determining the final price based on all previous calculations and adjustments.
The 17th step involves taking into account all previous steps in the pricing procedure
It may involve applying discounts, taxes, and any other adjustments to arrive at the final price
This step is crucial in ensuring that the final price is accurate and competitive
Q153. Do you know Design thinking? What is it? How have you implemented it?
Design thinking is a problem-solving approach that focuses on understanding the user's needs and creating innovative solutions.
Design thinking involves empathizing with the user, defining the problem, ideating solutions, prototyping, and testing.
I have implemented design thinking in a project where we conducted user interviews to understand their pain points and then brainstormed creative solutions.
By following the design thinking process, we were able to develop a product th...read more
Q154. If i give rotational shift to you can you do it Subhajit?
Yes, I am willing to work rotational shifts as required for the job.
I am flexible and adaptable to different work schedules.
I understand the importance of meeting project deadlines and will adjust my schedule accordingly.
I have previous experience working in rotational shifts at my previous job.
I am committed to my work and will ensure that my performance is not affected by the shift changes.
Q155. How Single Sign On (SSO) gets configured?
SSO is configured by setting up a trust relationship between the identity provider and the service provider.
The identity provider and service provider must agree on a common protocol, such as SAML or OAuth
The identity provider must be configured to authenticate users and provide identity information to the service provider
The service provider must be configured to trust the identity provider and accept the identity information provided
Configuration may involve exchanging meta...read more
Q156. Which type of schema you are using in your project?
Q157. how you will restart the pods in the clusters?
Restarting pods in clusters involves identifying the affected pod, deleting it, and allowing the cluster to create a new one.
Identify the affected pod using kubectl get pods command
Delete the pod using kubectl delete pod command
Allow the cluster to create a new pod automatically
Use kubectl rollout restart command to restart all pods in a deployment
Use kubectl scale command to increase or decrease the number of replicas in a deployment
Q158. What is sanctions countries
Sanctioned countries are those that have been subjected to economic or political restrictions by other countries or international organizations.
Sanctions are typically imposed as a means of exerting pressure on a country to change its behavior.
Sanctions can include trade restrictions, financial restrictions, travel bans, and arms embargoes.
Examples of currently sanctioned countries include Iran, North Korea, Syria, and Venezuela.
Q159. 1. How JS works behind the scenes. 2. Hoisting in JS 3. Event Loop 4. Some basic questions on Reactjs and Redux.
JS works by interpreting and executing code line by line, hoisting moves variable declarations to the top, event loop manages asynchronous operations, Reactjs and Redux are popular libraries for building user interfaces.
JS works by interpreting and executing code line by line.
Hoisting in JS moves variable declarations to the top.
Event Loop in JS manages asynchronous operations.
Reactjs and Redux are popular libraries for building user interfaces.
Q160. what are the pre requisite for the class used in the work flow
Pre requisites for a class used in a workflow
The class must be defined as a global class
The class must be active and released
The class must implement the necessary interfaces for workflow usage
The class must have the appropriate methods for workflow processing
Q161. Explain p2p cycle with example?
P2P cycle refers to the procurement process from purchase to payment.
The cycle starts with identifying the need for a product or service.
A purchase order is then created and sent to the supplier.
The supplier delivers the product or service and sends an invoice.
The invoice is matched with the purchase order and goods receipt.
If everything matches, the invoice is approved for payment.
Payment is then made to the supplier.
The cycle ends with recording the transaction in the accou...read more
Q162. Mention 5 key fileds in pr ??
The 5 key fields in PR are supplier management, contract management, sourcing, negotiation, and spend analysis.
Supplier management involves identifying and managing suppliers to ensure timely delivery of goods and services.
Contract management involves creating and managing contracts with suppliers to ensure compliance and minimize risk.
Sourcing involves identifying potential suppliers and evaluating their capabilities and offerings.
Negotiation involves negotiating with suppli...read more
Q163. Which technologies I've worked on.
I have worked on a variety of technologies as a Network Engineer.
Cisco networking equipment
Routing and switching protocols (e.g. OSPF, BGP)
Firewalls and security appliances (e.g. Cisco ASA, Palo Alto)
Network monitoring and management tools (e.g. SolarWinds, Wireshark)
Virtualization technologies (e.g. VMware, Hyper-V)
Load balancers (e.g. F5, Citrix NetScaler)
Wireless networking (e.g. Cisco Meraki, Aruba)
Network troubleshooting and performance optimization
Q164. What is role of advising bank?
The advising bank plays a crucial role in international trade transactions by providing guidance and assistance to both the exporter and importer.
The advising bank acts as an intermediary between the exporter's bank and the importer's bank.
It verifies the authenticity of the letter of credit (LC) issued by the importer's bank to ensure its compliance with the terms and conditions.
The advising bank advises the exporter about the terms and conditions of the LC, including any am...read more
Q165. How is shareholding structure calculated, types of screenings
Shareholding structure is calculated by determining the percentage of shares owned by each shareholder. Types of screenings include anti-money laundering and know-your-customer checks.
Shareholding structure is calculated by dividing the number of shares owned by a shareholder by the total number of outstanding shares.
Types of screenings include anti-money laundering checks to ensure that shareholders are not involved in illegal activities.
Know-your-customer checks are also co...read more
Q166. Write a query to find the nth highest salary for every department
Query to find the nth highest salary for every department
Use the RANK() function to rank salaries within each department
Filter the results to only include the nth highest salary for each department
Use a subquery to join the results with the department table to get department names
Example: SELECT department_name, salary FROM (SELECT department_id, salary, RANK() OVER (PARTITION BY department_id ORDER BY salary DESC) AS rank FROM employees) WHERE rank = n
Replace 'n' with the de...read more
Q167. Trigger on Contact, to create roll up summary field.
Q168. Managerial round / wht is roles and resposibilities?
Roles and responsibilities of a Senior Software Engineer involve leading technical projects, mentoring junior developers, collaborating with cross-functional teams, and ensuring code quality and scalability.
Leading technical projects and providing technical guidance to team members
Mentoring junior developers and helping them grow in their technical skills
Collaborating with cross-functional teams such as product managers, designers, and QA testers
Ensuring code quality through ...read more
Q169. What's is hsrp?
HSRP stands for Hot Standby Router Protocol. It is a Cisco proprietary protocol used to provide redundancy for IP networks.
HSRP is used to create a virtual IP address that can be shared by multiple routers in a network.
It allows for automatic failover in case the primary router fails.
HSRP routers elect an active router and standby routers, with the active router handling traffic while the standby routers are ready to take over if needed.
It uses a virtual MAC address and a vir...read more
Q170. How do you upgrade the version from 11.7.0 to 11.7.1
Upgrade from 11.7.0 to 11.7.1 involves downloading the new version and running the upgrade script.
Download the 11.7.1 version from the vendor's website
Backup the current system and database
Run the upgrade script provided with the new version
Verify the upgrade was successful by checking system functionality
Q171. What is the difference between java oops concept? Opps concepts and usage in real life
Q172. Master data tables for customer and material master
Master data tables for customer and material master are essential for storing detailed information about customers and materials.
Customer master table stores information about customers such as name, address, contact details, etc.
Material master table stores information about materials such as description, unit of measure, price, etc.
These tables are crucial for efficient data management and retrieval in a business system.
Q173. Placement of tax configuration in pricing procedure
Tax configuration should be placed at the end of the pricing procedure to ensure accurate calculations.
Tax configuration should be placed after all other conditions and calculations in the pricing procedure.
This ensures that taxes are calculated on the final price after all discounts and surcharges have been applied.
Placing tax configuration at the end helps in avoiding any discrepancies in tax calculations.
Example: Condition types like PR00 for gross price, K004 for discount...read more
Q174. Tell me about yourself? Can you explain about P2P? Golden rule of accounting? What is account payable? What is provision for doubtful debt? What is the main checkpoint of an invoice?
I am a financial analyst with expertise in P2P, accounting principles, and invoice processing.
P2P stands for Procure-to-Pay, which is the process of requisitioning, purchasing, receiving, paying for, and accounting for goods and services.
The golden rule of accounting states that debit what comes in and credit what goes out.
Accounts payable is the amount a company owes to its suppliers or vendors for goods or services purchased on credit.
Provision for doubtful debt is an estim...read more
Q175. What is Kofi & Kofa ?
Kofi & Kofa are not related to SAP Fico. No relevant information found.
Q176. How to activate standard fiori application in launchpad
Q177. How you design highly availlable solution in azure?
Designing highly available solutions in Azure involves utilizing redundancy, load balancing, and fault tolerance.
Utilize Azure Availability Zones to ensure redundancy and fault tolerance
Implement Azure Load Balancer to distribute incoming traffic across multiple instances
Use Azure Traffic Manager for global load balancing and failover
Utilize Azure Auto Scaling to automatically adjust resources based on demand
Implement Azure Site Recovery for disaster recovery and high availab...read more
Q178. what is inheritance and polymorphism
Inheritance is a mechanism in object-oriented programming where a class inherits properties and behaviors from another class. Polymorphism allows objects of different classes to be treated as objects of a common superclass.
Inheritance allows a class to inherit attributes and methods from another class, promoting code reusability.
Polymorphism allows objects of different classes to be treated as objects of a common superclass, enabling flexibility and extensibility.
Example of i...read more
Q179. What are different components of WSDL and SOAP?
WSDL and SOAP have different components that enable communication between web services.
WSDL components include types, messages, port types, bindings, and services.
SOAP components include envelope, header, body, and fault.
WSDL describes the web service and SOAP defines the message format.
WSDL is written in XML and SOAP messages are sent over HTTP.
Examples of WSDL and SOAP can be found in popular web services like Amazon Web Services and Google Maps API.
Q180. What is monitoring tool
A monitoring tool is a software application or system that collects and analyzes data to track the performance and health of a system or application.
Monitoring tools collect data from various sources such as servers, networks, databases, and applications.
They provide real-time visibility into the system's performance, availability, and resource utilization.
Monitoring tools can generate alerts or notifications when predefined thresholds or conditions are met.
They often include...read more
Q181. What is directive in a AngularJS?
Directive is a feature in AngularJS that allows you to create custom HTML tags and attributes.
Directives are markers on a DOM element that tell AngularJS to attach a specified behavior to that element.
They can be used to create reusable components, manipulate the DOM, and add behavior to existing elements.
There are several types of directives in AngularJS, including attribute, element, class, and comment directives.
Examples of built-in directives include ng-model, ng-repeat, ...read more
Q182. Global Exception Handling using Spring Framework
Global exception handling in Spring Framework allows for centralized error handling and logging.
Spring provides a @ControllerAdvice annotation to define global exception handling
Exception handling can be customized based on the type of exception thrown
Logging can be implemented using AOP and Spring's @Around advice
Example: @ControllerAdvice class with @ExceptionHandler methods for specific exceptions
Example: AOP logging using Spring's @Around advice
Q183. 1-Framework Explanation(how to design)
Framework design involves creating a structured approach to automate testing.
Identify the testing requirements and objectives
Choose a suitable automation tool
Create a modular and reusable code structure
Implement error handling and reporting mechanisms
Integrate with version control and continuous integration systems
Ensure scalability and maintainability
Examples: Keyword-driven, Data-driven, Hybrid frameworks
Q184. How do you unlock a datastage job if it's locked.
To unlock a locked DataStage job, you need to find the user who has locked it and ask them to release the lock.
Check the job status to confirm if it's locked
Identify the user who has locked the job
Contact the user and request them to release the lock
If the user is not available, escalate the issue to the DataStage administrator
Q185. Building resilient and scalable cloud architecture with supporting project experience.
I have extensive experience in designing and implementing resilient and scalable cloud architectures for various projects.
Utilizing cloud-native services such as AWS Lambda, S3, and DynamoDB to build serverless architectures
Implementing auto-scaling groups and load balancers to ensure high availability and scalability
Designing fault-tolerant architectures with multi-region redundancy and disaster recovery mechanisms
Using infrastructure-as-code tools such as Terraform and Clou...read more
Q186. How to create your own immutable class?
Creating an immutable class involves making the class and its fields final and not providing any setters.
Make the class final so it cannot be extended
Make all fields final so they cannot be changed
Do not provide any setters, only getters
If mutable objects are used in the class, return copies of them in getters
Q187. Q1. What is Protocol and full Explanation. Ans. Protocol is a set of rules which are used in digital communication to connect network device and Exchange information between them.
Protocol is a set of rules used in digital communication to connect network devices and exchange information.
Protocols define the format, timing, sequencing, and error checking of data transmission.
Examples of protocols include TCP/IP, HTTP, FTP, and SMTP.
Protocols ensure that devices can communicate effectively and understand each other's data.
Different protocols serve different purposes, such as routing data, sending emails, or accessing websites.
Q188. How is your Excel vlookup piort table How much you rate your communication skill What is resone behind leaving your current job
My Excel vlookup pivot table skills are proficient. I rate my communication skills highly. I am leaving my current job for career growth opportunities.
Proficient in using Excel vlookup and pivot tables for data analysis
Highly rate my communication skills due to experience in presenting findings to stakeholders
Leaving current job for career growth opportunities such as seeking a more challenging role
Q189. What do you know about server and monitoring
Server monitoring involves tracking the performance and availability of servers to ensure optimal operation.
Server monitoring involves tracking key metrics such as CPU usage, memory usage, disk space, and network traffic.
Monitoring tools like Nagios, Zabbix, and Datadog are commonly used to monitor servers.
Alerts can be set up to notify administrators when certain thresholds are exceeded or when server issues are detected.
Monitoring can also include checking server logs for e...read more
Q190. Explain the customer non technical issues and make it easy for them to browse softwares and technical files.
To address customer non-technical issues in browsing software and technical files, provide user-friendly interfaces, clear instructions, and accessible support.
Create user-friendly interfaces with intuitive navigation
Provide clear instructions on how to browse and access software and technical files
Offer accessible support options such as live chat, FAQs, and tutorials
Ensure compatibility with various devices and browsers for seamless browsing experience
Q191. Difference between CASE and Decode
CASE and Decode are SQL functions used to manipulate data. CASE is more flexible while Decode is simpler.
CASE allows for multiple conditions and expressions while Decode only allows for one condition and multiple values
CASE can be used in any SQL statement while Decode is specific to Oracle databases
CASE is more readable and easier to maintain than Decode
Example: CASE WHEN condition1 THEN result1 WHEN condition2 THEN result2 ELSE result3 END
Example: Decode(column, value1, res...read more
Q192. What is sanction List of the sanction country What is aml What is kyc
Sanction is a penalty imposed on a country or individual for violating laws or regulations. AML is Anti-Money Laundering and KYC is Know Your Customer.
Sanctions are used to restrict trade, freeze assets, and limit access to financial markets.
Examples of sanctioned countries include Iran, North Korea, and Syria.
AML refers to the laws, regulations, and procedures intended to prevent criminals from disguising illegally obtained funds as legitimate income.
KYC is the process of ve...read more
Q193. What are some of the error codes in API
API error codes are numerical or alphanumeric codes that indicate an error occurred during API usage.
Error codes help developers identify and troubleshoot issues with API requests and responses.
Common error codes include 400 Bad Request, 401 Unauthorized, 404 Not Found, and 500 Internal Server Error.
API providers may also create custom error codes specific to their API.
Error codes may be accompanied by error messages that provide additional information about the issue.
Develop...read more
Q194. In kafka how multiple consumer can access same messages?
Multiple consumers can access the same messages in Kafka by using consumer groups.
Consumers can be grouped together to share the workload of processing messages.
Each consumer in a group will receive a subset of the messages from the same topic.
Consumers in the same group will coordinate to ensure that each message is processed only once.
Consumer offsets are used to track the progress of each consumer in the group.
Q195. Reverse the string (code in java )
Reverse a string in Java using StringBuilder or character array.
Use StringBuilder's reverse() method to reverse the string.
Alternatively, convert the string to a character array, swap characters from start and end, then convert back to string.
Q196. What's is VTP?
VTP stands for VLAN Trunking Protocol. It is a Cisco proprietary protocol used to manage VLAN configurations across a network.
VTP allows for centralized management of VLANs in a network.
It enables the creation, deletion, and renaming of VLANs on a switch and automatically propagates these changes to other switches in the network.
VTP operates in three modes: server, client, and transparent.
Server mode allows VLAN configuration changes, client mode receives and stores VLAN info...read more
Q197. Write a query to remove duplicates , true duplicates.
Query to remove true duplicates
Identify the columns that define a unique record
Use GROUP BY to group the records by those columns
Use HAVING to filter out groups with more than one record
Use DELETE to remove the duplicate records
Q198. What is banking process
Banking process refers to the set of activities and procedures involved in managing financial transactions within a bank.
Banking process involves opening and closing accounts, processing deposits and withdrawals, issuing loans and credit cards, and managing investments.
It also includes compliance with regulatory requirements, risk management, and fraud prevention.
Examples of banking processes include account opening procedures, loan application processes, and transaction proc...read more
Q199. How you integrate external system with Salesforce?
External systems can be integrated with Salesforce using APIs and middleware tools.
Identify the external system and its APIs
Create a connected app in Salesforce and obtain API credentials
Use middleware tools like MuleSoft, Dell Boomi, or Jitterbit to integrate the systems
Develop custom Apex code to call external APIs and process data
Use Salesforce's pre-built integrations with popular systems like SAP, Oracle, and Microsoft
Ensure data security and compliance with regulations ...read more
Q200. What are SQL comments
SQL comments are used to add explanatory notes or remarks within SQL code.
SQL comments start with a double hyphen (--), or can be enclosed between /* and */
Comments are ignored by the SQL engine and are not executed as part of the code
Comments can be used to improve code readability and provide documentation
Comments can be used to disable or temporarily remove parts of the code for testing or debugging purposes
More about working at IBM
Top HR Questions asked in Maren Solutions
Interview Process at Maren Solutions
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month