Add office photos
Engaged Employer

IBM

4.0
based on 21.5k Reviews
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

400+ Maren Solutions Interview Questions and Answers

Updated 29 Dec 2024
Popular Designations

Q101. How many host will be in /29?

Ans.

A /29 subnet has 6 usable host addresses.

  • A /29 subnet has a subnet mask of 255.255.255.248.

  • The subnet mask leaves 3 bits for host addresses.

  • 2^3 = 8, but 2 addresses are reserved for network and broadcast.

  • Therefore, a /29 subnet has 6 usable host addresses.

View 4 more answers

Q102. Q2. What is a Gateway and full Explanation. Ans. Gateway is a hardware device that is used to connect two dissimilar type of network. It allows us to send and receive data through the internet event it is LAN n...

read more
Ans.

A gateway is a hardware device that connects two dissimilar types of networks, allowing data to be sent and received through the internet even if it is a LAN network.

  • Gateway acts as an entry and exit point for data traffic between networks

  • It translates data between different network protocols

  • Examples include routers and firewalls that connect a local network to the internet

Add your answer

Q103. What is the difference between domain and work group?

Ans.

Domain is a centralized network where a server controls access and security. Workgroup is a decentralized network where each computer has its own security settings.

  • Domain is a centralized network where a server controls access and security.

  • Workgroup is a decentralized network where each computer has its own security settings.

  • Domain is used in larger organizations with many users and computers.

  • Workgroup is used in smaller organizations with fewer users and computers.

  • Domain all...read more

Add your answer

Q104. How can you can analyse ur responsibilities as a Business Analyst.

Ans.

As a Business Analyst, I can analyze my responsibilities by identifying key stakeholders, gathering requirements, and creating solutions.

  • Identify key stakeholders and their needs

  • Gather and document requirements

  • Analyze data and create solutions

  • Collaborate with cross-functional teams

  • Ensure project goals are met

  • Continuously improve processes

  • Communicate effectively with stakeholders

Add your answer
Discover Maren Solutions interview dos and don'ts from real experiences

Q105. Types of network?

Ans.

There are several types of networks, including LAN, WAN, MAN, WLAN, and PAN.

  • Local Area Network (LAN) is a network that covers a small area, such as an office or a building.

  • Wide Area Network (WAN) is a network that covers a large geographical area, such as multiple cities or countries.

  • Metropolitan Area Network (MAN) is a network that covers a larger area than a LAN but smaller than a WAN, typically within a city.

  • Wireless Local Area Network (WLAN) is a LAN that uses wireless co...read more

View 4 more answers

Q106. Q4 KPI and SLA/TAT? Q5 PTP Cycle? Q6 SOP/DTP? Q7 senerio questions? Q8 Accounting questions - golden rules, types of accounts, journal entries, depreciation etc) Q9 80*20 Principle?

Ans.

The interview questions cover KPIs, PTP cycle, SOP/DTP, scenario questions, accounting principles, and the 80/20 principle.

  • Q4: Discuss key performance indicators and service level agreements/turnaround times.

  • Q5: Explain the procure-to-pay cycle.

  • Q6: Describe standard operating procedures and document-to-process mapping.

  • Q7: Answer scenario-based questions related to financial analysis.

  • Q8: Discuss accounting principles such as the golden rules, types of accounts, journal entries...read more

Add your answer
Are these interview questions helpful?

Q107. Order Of Execution in Salesforce related Scenarios

Ans.

Order of execution in Salesforce determines the sequence in which various operations are performed.

  • The order of execution is as follows: Validation rules, before triggers, after triggers, assignment rules, auto-response rules, workflow rules, processes, escalation rules, and finally, the commit.

  • Validation rules are checked first to ensure data integrity.

  • Before triggers are executed before the record is saved to the database.

  • After triggers are executed after the record is save...read more

View 2 more answers

Q108. How do you negotiate with OEM.?

Ans.

Negotiate with OEM by understanding their needs, building relationships, and finding win-win solutions.

  • Research the OEM's business and industry to understand their needs and priorities

  • Build a relationship with the OEM based on trust and mutual respect

  • Identify areas of common interest and work towards win-win solutions

  • Be prepared to compromise and find creative solutions to overcome obstacles

  • Communicate clearly and effectively throughout the negotiation process

  • Consider the lon...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q109. What is the keyword for function? What project I did in my college final year?

Ans.

The keyword for function in programming is 'function'.

  • The keyword 'function' is used to define a function in programming languages like JavaScript.

  • Functions are blocks of code that perform a specific task and can be called multiple times within a program.

Add your answer

Q110. Pre-requisite for IDoc config at ECC and PO end?

Ans.

The pre-requisite for IDoc config at ECC and PO end is to have the necessary RFC destinations and ports configured.

  • RFC destinations must be created in both ECC and PO systems

  • Ports must be configured in both systems

  • Partner profiles must be maintained in both systems

  • IDoc types and message types must be defined and linked to the appropriate RFC destinations and ports

  • The necessary authorizations must be assigned to the user performing the configuration

Add your answer

Q111. what is the difference between nw9 and nw19 version?

Ans.

NW9 and NW19 are different versions of NetWorker software with varying features and capabilities.

  • NW19 has improved backup and recovery performance compared to NW9.

  • NW19 supports more operating systems and applications than NW9.

  • NW19 has enhanced security features such as TLS 1.2 support.

  • NW19 has a new web-based user interface for easier management.

  • NW19 has a new feature called CloudBoost for cloud-based data protection.

  • NW9 is an older version and may not be supported by newer h...read more

View 1 answer

Q112. How can you handle Client Requirements and What is SRS?

Ans.

Handling client requirements involves understanding their needs and translating them into a Software Requirements Specification (SRS).

  • Listen actively to the client's needs and ask clarifying questions

  • Document the requirements in a clear and concise manner

  • Ensure that the requirements are feasible and align with the project goals

  • Collaborate with the development team to ensure that the requirements are implemented correctly

  • Regularly communicate with the client to ensure that the...read more

Add your answer

Q113. Briefly describe the architectural methods followed to prepare a feasible solution for any client's requirements?

Ans.

Architectural methods involve understanding client requirements, analyzing site conditions, creating design concepts, and refining the solution.

  • Understand client's needs and preferences

  • Analyze site conditions and constraints

  • Create design concepts and present to client

  • Refine the solution based on feedback

  • Consider budget and timeline constraints

  • Collaborate with engineers and contractors

  • Ensure compliance with building codes and regulations

Add your answer

Q114. How would you implement SCD TYPE 2 IN INFORMATICA?

Ans.

Implementing SCD Type 2 in Informatica involves using Slowly Changing Dimension transformations and mapping variables.

  • Use Slowly Changing Dimension (SCD) transformations in Informatica to track historical changes in data.

  • Create mapping variables to keep track of effective start and end dates for each record.

  • Use Update Strategy transformations to handle inserts, updates, and deletes in the target table.

  • Implement Type 2 SCD by inserting new records with updated data and marking...read more

Add your answer

Q115. Have you ever done a HANA Database Refresh?

Ans.

Yes, I have experience in performing HANA database refresh.

  • I have performed HANA database refresh for various clients during my tenure as a SAP Basis consultant.

  • I am well-versed with the process of taking a backup of the source database and restoring it on the target system.

  • I have also worked on post-refresh activities such as updating system configurations and performing system checks to ensure data consistency.

  • One of the recent examples of my work includes performing a HANA...read more

Add your answer

Q116. Any knowledge on windows servers, what do you know about patching windows, types of servers you know.

Ans.

I have knowledge on patching Windows servers and different types of servers.

  • I am familiar with the process of patching Windows servers to ensure they are up to date with the latest security updates and bug fixes.

  • I am aware of different types of Windows servers such as file servers, web servers, domain controllers, and application servers.

  • I understand the importance of regularly patching servers to protect against vulnerabilities and ensure optimal performance.

Add your answer

Q117. How spring boot is difference from spring?

Ans.

Spring Boot is a framework that simplifies the configuration and deployment of Spring-based applications.

  • Spring Boot provides a pre-configured environment for building and running Spring applications.

  • It eliminates the need for XML configuration files and reduces boilerplate code.

  • It includes an embedded web server and supports various data sources and messaging systems.

  • Example: Spring Boot can be used to quickly create a RESTful web service with minimal configuration.

  • Example: ...read more

Add your answer

Q118. What is c? How it's function work

Ans.

C is a programming language used for system programming, embedded systems, and game development.

  • C was developed by Dennis Ritchie at Bell Labs in 1972.

  • It is a compiled language, meaning that the code is translated into machine-readable instructions before execution.

  • C is known for its efficiency and low-level control over hardware, making it a popular choice for operating systems and device drivers.

  • C functions are defined with a return type, name, and parameters, and can be ca...read more

Add your answer

Q119. How much confident I have to work in S4 HANA implementation project in configuration level.

Ans.

I am highly confident in working on S4 HANA implementation projects at the configuration level.

  • I have extensive experience in SAP SD configuration and have successfully completed multiple implementation projects.

  • I have undergone training specifically for S4 HANA and have hands-on experience with the system.

  • I am familiar with the new features and functionalities of S4 HANA and can effectively configure them to meet business requirements.

Add your answer

Q120. Difference between finance and accounts, What is Ledger creation, Cash flow and fund flow,What was your last company work What is GST and taxation

Ans.

Finance and accounts are related but distinct fields. Ledger creation is the process of recording financial transactions. Cash flow and fund flow are tools used to analyze the movement of money in a business. GST is a tax system in India.

  • Finance deals with the management of money and investments, while accounts focus on recording and analyzing financial transactions.

  • Ledger creation involves setting up accounts to record financial transactions, such as sales, purchases, and ex...read more

View 1 answer

Q121. What is the difference between share point and one drive?

Ans.

SharePoint is a collaboration platform while OneDrive is a personal cloud storage service.

  • SharePoint is used for team collaboration and document management.

  • OneDrive is used for personal file storage and sharing.

  • SharePoint allows multiple users to work on the same document simultaneously.

  • OneDrive allows users to access their files from anywhere with an internet connection.

  • SharePoint is typically used by organizations while OneDrive is used by individuals.

  • SharePoint offers more...read more

Add your answer

Q122. What is the difference between invoice and credit note

Ans.

An invoice is a bill for goods or services provided, while a credit note is a document issued to reduce the amount owed on an invoice.

  • An invoice is issued when goods or services are sold or provided to a customer.

  • An invoice shows the amount owed by the customer to the seller or service provider.

  • A credit note is issued when there is a need to reduce the amount owed on an invoice.

  • A credit note can be issued for various reasons, such as returns, discounts, or errors in the origi...read more

Add your answer

Q123. What is ticketing tool

Ans.

A ticketing tool is a software application used to track and manage customer support requests or issues.

  • Ticketing tools help in organizing and prioritizing customer support tickets.

  • They provide a centralized platform for communication and collaboration between support teams and customers.

  • Ticketing tools often include features like ticket assignment, status tracking, and reporting.

  • Examples of popular ticketing tools include Jira Service Desk, Zendesk, and Freshdesk.

View 1 answer

Q124. Explain how you will transform digitally for our client ?

Ans.

We will implement a comprehensive digital strategy that includes automation, data analytics, and cloud computing.

  • Develop a roadmap for digital transformation

  • Identify key areas for automation and implement appropriate tools

  • Leverage data analytics to gain insights and improve decision-making

  • Migrate to cloud-based infrastructure for scalability and cost savings

  • Train employees on new technologies and processes

  • Continuously monitor and optimize digital strategy

Add your answer

Q125. Q1 What is transition? Q2 T - code used for payment and invoice processing? Q3 what the process you follow to check duplicity before proceeding further for payment?

Ans.

Transition refers to the process of moving from one state or condition to another.

  • Transition can occur in various contexts, such as organizational change, personal growth, or project management.

  • In finance, transition may refer to the process of moving from one accounting system to another.

  • T-code FB60 is commonly used for invoice processing in SAP.

  • To check for duplicity before payment, a financial analyst may use tools such as duplicate invoice reports or vendor master data.

  • Ot...read more

Add your answer

Q126. Explain VPC, NAT Gateway, difference between NACL and SG

Ans.

VPC is a virtual private cloud that allows you to create isolated networks, NAT Gateway enables instances in a private subnet to connect to the internet, NACL controls inbound and outbound traffic at the subnet level, SG controls traffic at the instance level.

  • VPC is a virtual network in the cloud that you can define and customize, providing a secure environment for your resources.

  • NAT Gateway allows instances in a private subnet to access the internet while remaining private.

  • N...read more

Add your answer

Q127. What is purchase order ?

Ans.

A purchase order is a document issued by a buyer to a seller, indicating types, quantities, and agreed prices for products or services.

  • It is a legal document that outlines the details of a purchase agreement between a buyer and a seller.

  • It includes information such as the product or service being purchased, the quantity, the agreed-upon price, and delivery date.

  • It serves as a contract between the buyer and seller, ensuring that both parties are aware of the terms of the agree...read more

Add your answer

Q128. What is the difference between private ip and public up address

Add your answer

Q129. Item categories for return orders, consignment processes and their schedule lines

Ans.

Item categories for return orders, consignment processes, and their schedule lines

  • Return orders typically fall under categories like damaged goods, wrong item received, or change of mind

  • Consignment processes may involve categories such as delivery scheduling, inventory management, and payment terms

  • Schedule lines for return orders and consignment processes help track timelines for actions and deliveries

Add your answer

Q130. What is difference between snowflake schema and Star Schema?

Add your answer

Q131. What is your experience with technical discussions related to specific modules?

Ans.

I have extensive experience leading technical discussions on specific modules.

  • Led discussions on customizing SAP modules to meet client requirements

  • Collaborated with developers to troubleshoot technical issues within modules

  • Provided training to team members on module functionalities and best practices

  • Participated in module upgrade projects to ensure smooth transition and minimal downtime

Add your answer

Q132. Explain how you were managing SCM and what tools were used?

Ans.

I managed SCM using a combination of tools and strategies.

  • I used a variety of software tools to manage inventory, track shipments, and analyze data.

  • I also implemented strategies such as just-in-time inventory management and lean manufacturing.

  • Some of the tools I used include SAP, Oracle, and JDA Software.

  • I regularly communicated with suppliers and logistics partners to ensure timely delivery of goods.

  • I monitored key performance indicators such as inventory turnover and on-tim...read more

Add your answer

Q133. What do you understand by maximo tool ..could you explain in practical way .how to use it

Add your answer

Q134. 3.What if two thread tries to modify the collection? ConcurrentModificationException.

Add your answer

Q135. What is microprocessor and how its work

Ans.

A microprocessor is a small computer chip that performs arithmetic and logic operations.

  • Microprocessors are the heart of modern computers and electronic devices.

  • They are made up of millions of transistors that switch on and off to perform calculations.

  • Microprocessors fetch instructions from memory, decode them, and execute them.

  • Examples of microprocessors include Intel's Pentium and AMD's Ryzen processors.

  • Microprocessors are used in a wide range of applications, from smartpho...read more

Add your answer

Q136. What is micro control and how its work

Ans.

Micro control is a type of control system that uses microprocessors to control various devices and processes.

  • Micro control systems are used in various applications such as home automation, industrial automation, and robotics.

  • They are designed to be compact and efficient, with low power consumption and high processing power.

  • Micro control systems can be programmed using various programming languages such as C, C++, and assembly language.

  • They can be used to control various devic...read more

Add your answer

Q137. what is primary key and foreign key

Ans.

Primary key uniquely identifies each record in a table, while foreign key establishes a link between two tables.

  • Primary key ensures data integrity by enforcing uniqueness of each record

  • Foreign key establishes a relationship between tables by referencing the primary key of another table

  • Primary key can be a single column or a combination of columns

  • Foreign key helps maintain referential integrity in a database

Add your answer

Q138. Embedded systems and how its work

Ans.

Embedded systems are computer systems designed to perform specific tasks within a larger system.

  • Embedded systems are often used in devices such as medical equipment, automobiles, and home appliances.

  • They typically have limited processing power and memory compared to general-purpose computers.

  • They are designed to be reliable and efficient, often running on low-power processors.

  • Programming languages commonly used for embedded systems include C and assembly language.

  • Embedded sys...read more

Add your answer

Q139. How to protect site from sapm? Multi site how to create?

Ans.

To protect a site from spam, implement CAPTCHA, use spam filters, validate user input, and monitor site activity. To create a multi-site, use a content management system with multi-site capabilities.

  • Implement CAPTCHA to prevent automated spam submissions

  • Use spam filters to detect and block spam content

  • Validate user input to ensure data integrity and prevent malicious code injection

  • Monitor site activity for suspicious behavior and patterns

  • For creating a multi-site, use a conte...read more

Add your answer

Q140. 4 - How to read data from excel

Ans.

To read data from Excel, we can use libraries like Apache POI or OpenCSV.

  • Create a FileInputStream object to read the Excel file

  • Create a Workbook object using the FileInputStream object

  • Get the sheet from the Workbook object using sheet name or index

  • Iterate through rows and columns to read data

  • Close the Workbook and FileInputStream objects

Add your answer

Q141. 1.What are the fields in /etc/fstab 2.what happens if we us 'l' instead of 'L' in lvextend command.

Ans.

Answering questions related to /etc/fstab fields and lvextend command.

  • Fields in /etc/fstab are device, mount point, file system type, options, dump frequency and file system check order

  • Using 'l' instead of 'L' in lvextend command will result in an error as 'l' is not a valid option

  • lvextend command is used to extend the size of a logical volume

  • The /etc/fstab file is used to define how file systems are mounted and accessed during system startup

Add your answer

Q142. RICEW component and complete oracle P2P and O2C Cycle.

Ans.

RICEW component and Oracle P2P and O2C Cycle

  • RICEW stands for Reports, Interfaces, Conversions, Enhancements, and Workflows

  • Oracle P2P cycle includes requisition, purchase order, receipt, and invoice processing

  • Oracle O2C cycle includes order entry, order fulfillment, shipping, and invoicing

  • RICEW components can be used to enhance and customize the P2P and O2C cycles

Add your answer

Q143. RAC architecture,startup and shutdown process steps in RAC, migration of spfile,asm migration

Ans.

Answering questions on RAC architecture, startup and shutdown process, spfile and ASM migration

  • RAC architecture involves multiple nodes sharing a common storage and network infrastructure

  • Startup process involves starting the Oracle Clusterware stack, starting the database instances, and mounting the database

  • Shutdown process involves dismounting the database, stopping the database instances, and stopping the Oracle Clusterware stack

  • Migration of spfile involves copying the spfi...read more

Add your answer

Q144. Cloud readiness assessments and strategy. Migration strategy for multi - cloud environments.

Ans.

Cloud readiness assessments and strategy involve evaluating an organization's ability to adopt cloud technology and developing a plan for multi-cloud migration.

  • Assess current IT infrastructure and identify areas for improvement

  • Determine business goals and objectives for cloud adoption

  • Develop a comprehensive cloud migration strategy

  • Consider security, compliance, and data management requirements

  • Evaluate different cloud providers and services

  • Implement a phased approach to migrat...read more

Add your answer

Q145. What are Rest services and Soap services?

Ans.

Rest and Soap are web services used for communication between systems.

  • Rest is an architectural style that uses HTTP protocol for communication.

  • Soap is a protocol that uses XML for communication.

  • Rest is lightweight and easy to use, while Soap is more complex.

  • Rest is used for mobile and web applications, while Soap is used for enterprise applications.

  • Examples of Rest services include Twitter API and Google Maps API, while examples of Soap services include Amazon Web Services an...read more

Add your answer

Q146. Why we use redux. Explain its principles?

Ans.

Redux is a predictable state container for JavaScript apps.

  • Redux helps manage the state of an application in a predictable way

  • It provides a single source of truth for the state of the application

  • Redux follows the principles of immutability and pure functions

  • It allows for easy debugging and time-travel debugging

  • Redux can be used with any UI library or framework

  • Example: A shopping cart application can use Redux to manage the state of the cart

Add your answer

Q147. How do you justify that router is active transformation?

Ans.

Router is an active transformation as it can change the number of rows that pass through it based on conditions.

  • Router transformation is used to route data from one source to multiple targets based on conditions.

  • It can change the number of rows that pass through it based on the conditions specified.

  • It evaluates each row against the conditions and sends the row to the appropriate output group.

  • It is an active transformation as it changes the number of rows that pass through it....read more

Add your answer

Q148. Tell me about RPA Journey phases? Difference between AA 2019 and 360

Add your answer

Q149. What is the use of condition record?

Ans.

Condition record is used to define pricing and discounts for customers and materials.

  • Condition record is used in SAP FICO module.

  • It is used to define pricing and discounts for customers and materials.

  • It helps in maintaining the consistency of pricing and discounts across the organization.

  • It can be used to define different pricing and discounts for different customers and materials.

  • Examples of condition records include pricing for a specific customer or material, discounts for...read more

Add your answer

Q150. What is meant by impairment of assets?

Ans.

Impairment of assets refers to a decrease in the value of a company's assets.

  • Impairment occurs when the carrying value of an asset exceeds its recoverable amount.

  • It is recognized as a loss on the company's income statement.

  • Examples include a decline in market value, physical damage, or obsolescence.

  • Impairment testing is required annually for goodwill and indefinite-lived intangible assets.

  • Impairment can have a significant impact on a company's financial statements and stock p...read more

Add your answer

Q151. What PCA, Decision tree and computer vision

Ans.

PCA is a dimensionality reduction technique, decision tree is a classification algorithm, and computer vision is a field of study focused on enabling computers to interpret and understand visual information.

  • PCA is used to reduce the number of variables in a dataset while retaining the most important information.

  • Decision trees are used to classify data based on a set of rules and conditions.

  • Computer vision involves using algorithms and techniques to enable computers to interpr...read more

Add your answer

Q152. What is the 17th step in pricing procedure

Ans.

The 17th step in pricing procedure is determining the final price based on all previous calculations and adjustments.

  • The 17th step involves taking into account all previous steps in the pricing procedure

  • It may involve applying discounts, taxes, and any other adjustments to arrive at the final price

  • This step is crucial in ensuring that the final price is accurate and competitive

Add your answer

Q153. Do you know Design thinking? What is it? How have you implemented it?

Ans.

Design thinking is a problem-solving approach that focuses on understanding the user's needs and creating innovative solutions.

  • Design thinking involves empathizing with the user, defining the problem, ideating solutions, prototyping, and testing.

  • I have implemented design thinking in a project where we conducted user interviews to understand their pain points and then brainstormed creative solutions.

  • By following the design thinking process, we were able to develop a product th...read more

Add your answer

Q154. If i give rotational shift to you can you do it Subhajit?

Ans.

Yes, I am willing to work rotational shifts as required for the job.

  • I am flexible and adaptable to different work schedules.

  • I understand the importance of meeting project deadlines and will adjust my schedule accordingly.

  • I have previous experience working in rotational shifts at my previous job.

  • I am committed to my work and will ensure that my performance is not affected by the shift changes.

Add your answer

Q155. How Single Sign On (SSO) gets configured?

Ans.

SSO is configured by setting up a trust relationship between the identity provider and the service provider.

  • The identity provider and service provider must agree on a common protocol, such as SAML or OAuth

  • The identity provider must be configured to authenticate users and provide identity information to the service provider

  • The service provider must be configured to trust the identity provider and accept the identity information provided

  • Configuration may involve exchanging meta...read more

Add your answer

Q156. Which type of schema you are using in your project?

Add your answer

Q157. how you will restart the pods in the clusters?

Ans.

Restarting pods in clusters involves identifying the affected pod, deleting it, and allowing the cluster to create a new one.

  • Identify the affected pod using kubectl get pods command

  • Delete the pod using kubectl delete pod command

  • Allow the cluster to create a new pod automatically

  • Use kubectl rollout restart command to restart all pods in a deployment

  • Use kubectl scale command to increase or decrease the number of replicas in a deployment

Add your answer

Q158. What is sanctions countries

Ans.

Sanctioned countries are those that have been subjected to economic or political restrictions by other countries or international organizations.

  • Sanctions are typically imposed as a means of exerting pressure on a country to change its behavior.

  • Sanctions can include trade restrictions, financial restrictions, travel bans, and arms embargoes.

  • Examples of currently sanctioned countries include Iran, North Korea, Syria, and Venezuela.

Add your answer

Q159. 1. How JS works behind the scenes. 2. Hoisting in JS 3. Event Loop 4. Some basic questions on Reactjs and Redux.

Ans.

JS works by interpreting and executing code line by line, hoisting moves variable declarations to the top, event loop manages asynchronous operations, Reactjs and Redux are popular libraries for building user interfaces.

  • JS works by interpreting and executing code line by line.

  • Hoisting in JS moves variable declarations to the top.

  • Event Loop in JS manages asynchronous operations.

  • Reactjs and Redux are popular libraries for building user interfaces.

Add your answer

Q160. what are the pre requisite for the class used in the work flow

Ans.

Pre requisites for a class used in a workflow

  • The class must be defined as a global class

  • The class must be active and released

  • The class must implement the necessary interfaces for workflow usage

  • The class must have the appropriate methods for workflow processing

Add your answer

Q161. Explain p2p cycle with example?

Ans.

P2P cycle refers to the procurement process from purchase to payment.

  • The cycle starts with identifying the need for a product or service.

  • A purchase order is then created and sent to the supplier.

  • The supplier delivers the product or service and sends an invoice.

  • The invoice is matched with the purchase order and goods receipt.

  • If everything matches, the invoice is approved for payment.

  • Payment is then made to the supplier.

  • The cycle ends with recording the transaction in the accou...read more

Add your answer

Q162. Mention 5 key fileds in pr ??

Ans.

The 5 key fields in PR are supplier management, contract management, sourcing, negotiation, and spend analysis.

  • Supplier management involves identifying and managing suppliers to ensure timely delivery of goods and services.

  • Contract management involves creating and managing contracts with suppliers to ensure compliance and minimize risk.

  • Sourcing involves identifying potential suppliers and evaluating their capabilities and offerings.

  • Negotiation involves negotiating with suppli...read more

Add your answer

Q163. Which technologies I've worked on.

Ans.

I have worked on a variety of technologies as a Network Engineer.

  • Cisco networking equipment

  • Routing and switching protocols (e.g. OSPF, BGP)

  • Firewalls and security appliances (e.g. Cisco ASA, Palo Alto)

  • Network monitoring and management tools (e.g. SolarWinds, Wireshark)

  • Virtualization technologies (e.g. VMware, Hyper-V)

  • Load balancers (e.g. F5, Citrix NetScaler)

  • Wireless networking (e.g. Cisco Meraki, Aruba)

  • Network troubleshooting and performance optimization

View 1 answer

Q164. What is role of advising bank?

Ans.

The advising bank plays a crucial role in international trade transactions by providing guidance and assistance to both the exporter and importer.

  • The advising bank acts as an intermediary between the exporter's bank and the importer's bank.

  • It verifies the authenticity of the letter of credit (LC) issued by the importer's bank to ensure its compliance with the terms and conditions.

  • The advising bank advises the exporter about the terms and conditions of the LC, including any am...read more

View 1 answer

Q165. How is shareholding structure calculated, types of screenings

Ans.

Shareholding structure is calculated by determining the percentage of shares owned by each shareholder. Types of screenings include anti-money laundering and know-your-customer checks.

  • Shareholding structure is calculated by dividing the number of shares owned by a shareholder by the total number of outstanding shares.

  • Types of screenings include anti-money laundering checks to ensure that shareholders are not involved in illegal activities.

  • Know-your-customer checks are also co...read more

Add your answer

Q166. Write a query to find the nth highest salary for every department

Ans.

Query to find the nth highest salary for every department

  • Use the RANK() function to rank salaries within each department

  • Filter the results to only include the nth highest salary for each department

  • Use a subquery to join the results with the department table to get department names

  • Example: SELECT department_name, salary FROM (SELECT department_id, salary, RANK() OVER (PARTITION BY department_id ORDER BY salary DESC) AS rank FROM employees) WHERE rank = n

  • Replace 'n' with the de...read more

Add your answer

Q167. Trigger on Contact, to create roll up summary field.

Add your answer

Q168. Managerial round / wht is roles and resposibilities?

Ans.

Roles and responsibilities of a Senior Software Engineer involve leading technical projects, mentoring junior developers, collaborating with cross-functional teams, and ensuring code quality and scalability.

  • Leading technical projects and providing technical guidance to team members

  • Mentoring junior developers and helping them grow in their technical skills

  • Collaborating with cross-functional teams such as product managers, designers, and QA testers

  • Ensuring code quality through ...read more

Add your answer

Q169. What's is hsrp?

Ans.

HSRP stands for Hot Standby Router Protocol. It is a Cisco proprietary protocol used to provide redundancy for IP networks.

  • HSRP is used to create a virtual IP address that can be shared by multiple routers in a network.

  • It allows for automatic failover in case the primary router fails.

  • HSRP routers elect an active router and standby routers, with the active router handling traffic while the standby routers are ready to take over if needed.

  • It uses a virtual MAC address and a vir...read more

View 2 more answers

Q170. How do you upgrade the version from 11.7.0 to 11.7.1

Ans.

Upgrade from 11.7.0 to 11.7.1 involves downloading the new version and running the upgrade script.

  • Download the 11.7.1 version from the vendor's website

  • Backup the current system and database

  • Run the upgrade script provided with the new version

  • Verify the upgrade was successful by checking system functionality

Add your answer

Q171. What is the difference between java oops concept? Opps concepts and usage in real life

Add your answer

Q172. Master data tables for customer and material master

Ans.

Master data tables for customer and material master are essential for storing detailed information about customers and materials.

  • Customer master table stores information about customers such as name, address, contact details, etc.

  • Material master table stores information about materials such as description, unit of measure, price, etc.

  • These tables are crucial for efficient data management and retrieval in a business system.

Add your answer

Q173. Placement of tax configuration in pricing procedure

Ans.

Tax configuration should be placed at the end of the pricing procedure to ensure accurate calculations.

  • Tax configuration should be placed after all other conditions and calculations in the pricing procedure.

  • This ensures that taxes are calculated on the final price after all discounts and surcharges have been applied.

  • Placing tax configuration at the end helps in avoiding any discrepancies in tax calculations.

  • Example: Condition types like PR00 for gross price, K004 for discount...read more

Add your answer

Q174. Tell me about yourself? Can you explain about P2P? Golden rule of accounting? What is account payable? What is provision for doubtful debt? What is the main checkpoint of an invoice?

Ans.

I am a financial analyst with expertise in P2P, accounting principles, and invoice processing.

  • P2P stands for Procure-to-Pay, which is the process of requisitioning, purchasing, receiving, paying for, and accounting for goods and services.

  • The golden rule of accounting states that debit what comes in and credit what goes out.

  • Accounts payable is the amount a company owes to its suppliers or vendors for goods or services purchased on credit.

  • Provision for doubtful debt is an estim...read more

Add your answer

Q175. What is Kofi & Kofa ?

Ans.

Kofi & Kofa are not related to SAP Fico. No relevant information found.

    Add your answer

    Q176. How to activate standard fiori application in launchpad

    Add your answer

    Q177. How you design highly availlable solution in azure?

    Ans.

    Designing highly available solutions in Azure involves utilizing redundancy, load balancing, and fault tolerance.

    • Utilize Azure Availability Zones to ensure redundancy and fault tolerance

    • Implement Azure Load Balancer to distribute incoming traffic across multiple instances

    • Use Azure Traffic Manager for global load balancing and failover

    • Utilize Azure Auto Scaling to automatically adjust resources based on demand

    • Implement Azure Site Recovery for disaster recovery and high availab...read more

    Add your answer

    Q178. what is inheritance and polymorphism

    Ans.

    Inheritance is a mechanism in object-oriented programming where a class inherits properties and behaviors from another class. Polymorphism allows objects of different classes to be treated as objects of a common superclass.

    • Inheritance allows a class to inherit attributes and methods from another class, promoting code reusability.

    • Polymorphism allows objects of different classes to be treated as objects of a common superclass, enabling flexibility and extensibility.

    • Example of i...read more

    Add your answer

    Q179. What are different components of WSDL and SOAP?

    Ans.

    WSDL and SOAP have different components that enable communication between web services.

    • WSDL components include types, messages, port types, bindings, and services.

    • SOAP components include envelope, header, body, and fault.

    • WSDL describes the web service and SOAP defines the message format.

    • WSDL is written in XML and SOAP messages are sent over HTTP.

    • Examples of WSDL and SOAP can be found in popular web services like Amazon Web Services and Google Maps API.

    Add your answer

    Q180. What is monitoring tool

    Ans.

    A monitoring tool is a software application or system that collects and analyzes data to track the performance and health of a system or application.

    • Monitoring tools collect data from various sources such as servers, networks, databases, and applications.

    • They provide real-time visibility into the system's performance, availability, and resource utilization.

    • Monitoring tools can generate alerts or notifications when predefined thresholds or conditions are met.

    • They often include...read more

    View 1 answer

    Q181. What is directive in a AngularJS?

    Ans.

    Directive is a feature in AngularJS that allows you to create custom HTML tags and attributes.

    • Directives are markers on a DOM element that tell AngularJS to attach a specified behavior to that element.

    • They can be used to create reusable components, manipulate the DOM, and add behavior to existing elements.

    • There are several types of directives in AngularJS, including attribute, element, class, and comment directives.

    • Examples of built-in directives include ng-model, ng-repeat, ...read more

    Add your answer

    Q182. Global Exception Handling using Spring Framework

    Ans.

    Global exception handling in Spring Framework allows for centralized error handling and logging.

    • Spring provides a @ControllerAdvice annotation to define global exception handling

    • Exception handling can be customized based on the type of exception thrown

    • Logging can be implemented using AOP and Spring's @Around advice

    • Example: @ControllerAdvice class with @ExceptionHandler methods for specific exceptions

    • Example: AOP logging using Spring's @Around advice

    Add your answer

    Q183. 1-Framework Explanation(how to design)

    Ans.

    Framework design involves creating a structured approach to automate testing.

    • Identify the testing requirements and objectives

    • Choose a suitable automation tool

    • Create a modular and reusable code structure

    • Implement error handling and reporting mechanisms

    • Integrate with version control and continuous integration systems

    • Ensure scalability and maintainability

    • Examples: Keyword-driven, Data-driven, Hybrid frameworks

    View 1 answer

    Q184. How do you unlock a datastage job if it's locked.

    Ans.

    To unlock a locked DataStage job, you need to find the user who has locked it and ask them to release the lock.

    • Check the job status to confirm if it's locked

    • Identify the user who has locked the job

    • Contact the user and request them to release the lock

    • If the user is not available, escalate the issue to the DataStage administrator

    Add your answer

    Q185. Building resilient and scalable cloud architecture with supporting project experience.

    Ans.

    I have extensive experience in designing and implementing resilient and scalable cloud architectures for various projects.

    • Utilizing cloud-native services such as AWS Lambda, S3, and DynamoDB to build serverless architectures

    • Implementing auto-scaling groups and load balancers to ensure high availability and scalability

    • Designing fault-tolerant architectures with multi-region redundancy and disaster recovery mechanisms

    • Using infrastructure-as-code tools such as Terraform and Clou...read more

    Add your answer

    Q186. How to create your own immutable class?

    Ans.

    Creating an immutable class involves making the class and its fields final and not providing any setters.

    • Make the class final so it cannot be extended

    • Make all fields final so they cannot be changed

    • Do not provide any setters, only getters

    • If mutable objects are used in the class, return copies of them in getters

    Add your answer

    Q187. Q1. What is Protocol and full Explanation. Ans. Protocol is a set of rules which are used in digital communication to connect network device and Exchange information between them.

    Ans.

    Protocol is a set of rules used in digital communication to connect network devices and exchange information.

    • Protocols define the format, timing, sequencing, and error checking of data transmission.

    • Examples of protocols include TCP/IP, HTTP, FTP, and SMTP.

    • Protocols ensure that devices can communicate effectively and understand each other's data.

    • Different protocols serve different purposes, such as routing data, sending emails, or accessing websites.

    Add your answer

    Q188. How is your Excel vlookup piort table How much you rate your communication skill What is resone behind leaving your current job

    Ans.

    My Excel vlookup pivot table skills are proficient. I rate my communication skills highly. I am leaving my current job for career growth opportunities.

    • Proficient in using Excel vlookup and pivot tables for data analysis

    • Highly rate my communication skills due to experience in presenting findings to stakeholders

    • Leaving current job for career growth opportunities such as seeking a more challenging role

    Add your answer

    Q189. What do you know about server and monitoring

    Ans.

    Server monitoring involves tracking the performance and availability of servers to ensure optimal operation.

    • Server monitoring involves tracking key metrics such as CPU usage, memory usage, disk space, and network traffic.

    • Monitoring tools like Nagios, Zabbix, and Datadog are commonly used to monitor servers.

    • Alerts can be set up to notify administrators when certain thresholds are exceeded or when server issues are detected.

    • Monitoring can also include checking server logs for e...read more

    Add your answer

    Q190. Explain the customer non technical issues and make it easy for them to browse softwares and technical files.

    Ans.

    To address customer non-technical issues in browsing software and technical files, provide user-friendly interfaces, clear instructions, and accessible support.

    • Create user-friendly interfaces with intuitive navigation

    • Provide clear instructions on how to browse and access software and technical files

    • Offer accessible support options such as live chat, FAQs, and tutorials

    • Ensure compatibility with various devices and browsers for seamless browsing experience

    Add your answer

    Q191. Difference between CASE and Decode

    Ans.

    CASE and Decode are SQL functions used to manipulate data. CASE is more flexible while Decode is simpler.

    • CASE allows for multiple conditions and expressions while Decode only allows for one condition and multiple values

    • CASE can be used in any SQL statement while Decode is specific to Oracle databases

    • CASE is more readable and easier to maintain than Decode

    • Example: CASE WHEN condition1 THEN result1 WHEN condition2 THEN result2 ELSE result3 END

    • Example: Decode(column, value1, res...read more

    Add your answer

    Q192. What is sanction List of the sanction country What is aml What is kyc

    Ans.

    Sanction is a penalty imposed on a country or individual for violating laws or regulations. AML is Anti-Money Laundering and KYC is Know Your Customer.

    • Sanctions are used to restrict trade, freeze assets, and limit access to financial markets.

    • Examples of sanctioned countries include Iran, North Korea, and Syria.

    • AML refers to the laws, regulations, and procedures intended to prevent criminals from disguising illegally obtained funds as legitimate income.

    • KYC is the process of ve...read more

    Add your answer

    Q193. What are some of the error codes in API

    Ans.

    API error codes are numerical or alphanumeric codes that indicate an error occurred during API usage.

    • Error codes help developers identify and troubleshoot issues with API requests and responses.

    • Common error codes include 400 Bad Request, 401 Unauthorized, 404 Not Found, and 500 Internal Server Error.

    • API providers may also create custom error codes specific to their API.

    • Error codes may be accompanied by error messages that provide additional information about the issue.

    • Develop...read more

    Add your answer

    Q194. In kafka how multiple consumer can access same messages?

    Ans.

    Multiple consumers can access the same messages in Kafka by using consumer groups.

    • Consumers can be grouped together to share the workload of processing messages.

    • Each consumer in a group will receive a subset of the messages from the same topic.

    • Consumers in the same group will coordinate to ensure that each message is processed only once.

    • Consumer offsets are used to track the progress of each consumer in the group.

    Add your answer

    Q195. Reverse the string (code in java )

    Ans.

    Reverse a string in Java using StringBuilder or character array.

    • Use StringBuilder's reverse() method to reverse the string.

    • Alternatively, convert the string to a character array, swap characters from start and end, then convert back to string.

    Add your answer

    Q196. What's is VTP?

    Ans.

    VTP stands for VLAN Trunking Protocol. It is a Cisco proprietary protocol used to manage VLAN configurations across a network.

    • VTP allows for centralized management of VLANs in a network.

    • It enables the creation, deletion, and renaming of VLANs on a switch and automatically propagates these changes to other switches in the network.

    • VTP operates in three modes: server, client, and transparent.

    • Server mode allows VLAN configuration changes, client mode receives and stores VLAN info...read more

    View 2 more answers

    Q197. Write a query to remove duplicates , true duplicates.

    Ans.

    Query to remove true duplicates

    • Identify the columns that define a unique record

    • Use GROUP BY to group the records by those columns

    • Use HAVING to filter out groups with more than one record

    • Use DELETE to remove the duplicate records

    Add your answer

    Q198. What is banking process

    Ans.

    Banking process refers to the set of activities and procedures involved in managing financial transactions within a bank.

    • Banking process involves opening and closing accounts, processing deposits and withdrawals, issuing loans and credit cards, and managing investments.

    • It also includes compliance with regulatory requirements, risk management, and fraud prevention.

    • Examples of banking processes include account opening procedures, loan application processes, and transaction proc...read more

    Add your answer

    Q199. How you integrate external system with Salesforce?

    Ans.

    External systems can be integrated with Salesforce using APIs and middleware tools.

    • Identify the external system and its APIs

    • Create a connected app in Salesforce and obtain API credentials

    • Use middleware tools like MuleSoft, Dell Boomi, or Jitterbit to integrate the systems

    • Develop custom Apex code to call external APIs and process data

    • Use Salesforce's pre-built integrations with popular systems like SAP, Oracle, and Microsoft

    • Ensure data security and compliance with regulations ...read more

    Add your answer

    Q200. What are SQL comments

    Ans.

    SQL comments are used to add explanatory notes or remarks within SQL code.

    • SQL comments start with a double hyphen (--), or can be enclosed between /* and */

    • Comments are ignored by the SQL engine and are not executed as part of the code

    • Comments can be used to improve code readability and provide documentation

    • Comments can be used to disable or temporarily remove parts of the code for testing or debugging purposes

    View 1 answer
    1
    2
    3
    4
    5

    More about working at IBM

    Top Rated Mega Company - 2024
    Top Rated Company for Women - 2024
    Top Rated IT/ITES Company - 2024
    Contribute & help others!
    Write a review
    Share interview
    Contribute salary
    Add office photos

    Interview Process at Maren Solutions

    based on 409 interviews
    Interview experience
    4.2
    Good
    View more
    Interview Tips & Stories
    Ace your next interview with expert advice and inspiring stories

    Top Interview Questions from Similar Companies

    3.8
     • 390 Interview Questions
    3.8
     • 328 Interview Questions
    4.0
     • 245 Interview Questions
    3.9
     • 202 Interview Questions
    3.5
     • 166 Interview Questions
    4.3
     • 135 Interview Questions
    View all
    Top IBM Interview Questions And Answers
    Share an Interview
    Stay ahead in your career. Get AmbitionBox app
    qr-code
    Helping over 1 Crore job seekers every month in choosing their right fit company
    70 Lakh+

    Reviews

    5 Lakh+

    Interviews

    4 Crore+

    Salaries

    1 Cr+

    Users/Month

    Contribute to help millions

    Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

    Follow us
    • Youtube
    • Instagram
    • LinkedIn
    • Facebook
    • Twitter