IBM
400+ Beebom Interview Questions and Answers
Q201. How many types of jobs
There are various types of jobs based on industry, function, and skillset.
Jobs can be categorized into industries such as healthcare, technology, finance, etc.
They can also be classified based on functions like software development, marketing, sales, etc.
Different skillsets like programming, design, management, etc., lead to different job types.
Examples: Software Developer, Marketing Manager, Nurse, Financial Analyst, Graphic Designer.
Q202. What do you know about CS Workflows
CS Workflows refer to the processes and steps involved in managing and analyzing data in a computer science context.
CS Workflows involve defining data sources and transformations
They often include data cleaning, processing, and analysis steps
Tools like Apache Airflow and Luigi are commonly used for managing workflows
CS Workflows help automate data pipelines and ensure data quality and consistency
Q203. Java collections with String program
Java collections can store arrays of strings
Use ArrayList or HashSet to store arrays of strings
ArrayList allows duplicates while HashSet does not
Example: ArrayList
names = new ArrayList<>(); Example: HashSet
uniqueNames = new HashSet<>();
Q204. What is your goal about for future planning
My goal for future planning is to continuously learn and grow in my career while maintaining a healthy work-life balance.
Continuously improve my skills and knowledge through training and development opportunities
Set achievable career goals and work towards them
Prioritize self-care and maintain a healthy work-life balance
Stay up-to-date with industry trends and advancements
Build strong professional relationships and network
Contribute to the success of my organization
Q205. What is CoreData ? Describe with proper example ?
CoreData is a framework provided by Apple for managing the model layer of an application.
CoreData is used to manage the model layer objects in an iOS application.
It provides an object graph management and persistence framework.
CoreData can be used to store data locally on the device.
It supports relationships between entities and data validation.
Example: Storing user information like name, email, and address in a CoreData database.
Q206. solid design principles implementation not theoretical, if straight-forward- diff bw interface and abstract class modifiers in interface
Q207. How do you add users to groups and project
Users can be added to groups and projects through the system management console.
Access the system management console
Navigate to the user management section
Select the user(s) to add to the group or project
Choose the group or project to add the user(s) to
Save changes
Q208. What is the difference between SAP ui5 and fiori
Q209. What is sanction process
Sanction process is a legal or administrative action taken against an individual or entity for violating laws or regulations.
Sanctions can include fines, restrictions, or even criminal charges.
The process typically involves an investigation, followed by a determination of guilt or innocence.
If found guilty, the individual or entity may have the opportunity to appeal the decision.
Examples of sanctions include the US government's sanctions against Iran for its nuclear program, ...read more
Q210. What is amplification
Amplification is the process of increasing the magnitude of a signal.
Amplification is commonly used in audio systems to increase the volume of sound.
It can also refer to the process of increasing the power of an electrical signal.
Amplification can be achieved through the use of amplifiers or other electronic devices.
In genetics, amplification refers to the process of making multiple copies of a specific DNA sequence.
Amplification can also occur in natural phenomena, such as t...read more
Q211. Best practices of triggers& test classes
Best practices for triggers and test classes
Triggers should be kept simple and focused on a single task
Test classes should cover all possible scenarios and edge cases
Use System.assert() to verify expected results
Avoid hardcoding values in test classes
Use @testSetup to create test data
Avoid using SeeAllData=true
Use Test.startTest() and Test.stopTest() to test governor limits
Test both positive and negative scenarios
Use Test.isRunningTest() to avoid executing certain code during...read more
Q212. How to user lock & unlock
The 'user lock' and 'user unlock' commands are used to lock and unlock user accounts in Linux.
To lock a user account, use the 'usermod' command with the '-L' option followed by the username.
Example: usermod -L username
To unlock a user account, use the 'usermod' command with the '-U' option followed by the username.
Example: usermod -U username
Q213. What is KYC AML process
KYC AML process is a set of procedures and policies designed to prevent money laundering and terrorist financing.
KYC (Know Your Customer) involves verifying the identity of customers and assessing their potential risks
AML (Anti-Money Laundering) involves monitoring transactions and reporting suspicious activities
The process includes customer due diligence, risk assessment, ongoing monitoring, and reporting
Financial institutions and other regulated entities are required to com...read more
Q214. What is transaction monitoring
Transaction monitoring is the process of reviewing and analyzing financial transactions to detect suspicious activity.
It involves monitoring financial transactions in real-time or near real-time
It helps to identify potential money laundering, fraud, or other illegal activities
It involves setting up rules and thresholds to flag suspicious transactions
Examples include monitoring large cash deposits, frequent international transfers, and transactions involving high-risk countrie...read more
Q215. What is the difference between comp and comp3
Comp and Comp-3 are two different data types used in Mainframe systems.
Comp is a binary data type that uses one byte for each digit and can store positive and negative numbers.
Comp-3 is a packed decimal data type that uses half a byte for each digit and can store only positive numbers.
Comp is faster than Comp-3 but takes up more space.
Comp-3 is more space-efficient but slower than Comp.
Comp is used for arithmetic operations while Comp-3 is used for storage and display purpose...read more
Q216. Process of scripting and testing on loadrunner and jmeter.
Scripting and testing on LoadRunner and JMeter involves creating virtual users, recording scripts, parameterizing data, and executing tests.
Create virtual users to simulate real-world user behavior
Record scripts by capturing user actions and requests
Parameterize data to create realistic test scenarios
Execute tests to measure system performance and identify bottlenecks
Analyze test results to identify performance issues and optimize system performance
Q217. What is the difference between T&M and Fixed Price projects
T&M projects are based on hourly rates and actual hours worked, while Fixed Price projects have a set price for the entire project regardless of hours worked.
T&M projects involve billing based on actual hours worked and hourly rates
Fixed Price projects have a set price agreed upon at the beginning of the project
T&M projects offer more flexibility in terms of scope changes and timelines
Fixed Price projects provide more predictability in terms of budget and timeline
Examples: So...read more
Q218. Jenkins configuration with reports mail configuration
Jenkins can be configured to send email reports after a build. This requires SMTP server settings and plugin installation.
Install the Email Extension Plugin in Jenkins
Configure SMTP server settings in Jenkins
Add post-build action to send email notification
Customize email content and recipients
Test email configuration to ensure successful delivery
Q219. Migration types and 8R'S core are and working
Migration types and 8R'S core are important for Advisory System Analysts
Migration types include data migration, application migration, and infrastructure migration
8R'S core stands for readiness, reassessment, restructuring, reengineering, retention, retirement, recruitment, and redeployment
Advisory System Analysts need to understand these concepts to provide effective advice to clients
For example, if a client is considering migrating their data to a new system, the analyst ne...read more
Q220. How to restrict url access in Angular? What are pipes?
To restrict URL access in Angular, use Angular Router Guards.
Angular Router Guards can be used to restrict access to certain routes based on user authentication or authorization.
There are three types of guards: CanActivate, CanActivateChild, and CanLoad.
CanActivate is used to prevent access to a route, CanActivateChild is used to prevent access to child routes, and CanLoad is used to prevent lazy-loaded modules from being loaded.
Pipes in Angular are used to transform data bef...read more
Q221. How to u create component in react
To create a component in React, you need to define a JavaScript function or class that returns a React element.
Create a new file with a .jsx extension
Define a function or class that returns a React element
Export the function or class using the 'export' keyword
Import the component in the file where you want to use it
Render the component using the component name as a tag
Q222. How to debug the output type for the smartforms?
To debug the output type for smartforms, use transaction code SMARTFORMS and set breakpoints in the form processing function module.
Open transaction code SMARTFORMS in SAP system.
Select the smartform you want to debug.
Go to 'Form Interface' tab and set breakpoints in the form processing function module.
Execute the smartform with the desired output type to trigger the breakpoints and start debugging.
Analyze the data and logic flow to identify and resolve any issues with the ou...read more
Q223. Entire devops pipeline with tools stack used in my current project
Our devops pipeline includes Jenkins for CI/CD, Docker for containerization, Ansible for configuration management, and Nagios for monitoring.
Jenkins for continuous integration and continuous deployment
Docker for containerization of applications
Ansible for configuration management and automation
Nagios for monitoring system performance and alerts
Q224. How will you load if target is flat files
Flat file target loading process
Use Informatica PowerCenter to create a mapping
Define the source and target connections
Create a flat file target definition
Map the source fields to target fields
Configure the session properties
Run the workflow to load data into the flat file target
Q225. What are the three golden rules
The three golden rules are basic principles in accounting that guide the recording of financial transactions.
The first golden rule is the rule of personal accounts, which states that 'Debit the receiver, credit the giver'. For example, when cash is received from a customer, the cash account is debited and the customer's account is credited.
The second golden rule is the rule of real accounts, which states that 'Debit what comes in, credit what goes out'. For example, when good...read more
Q226. What is mpls?
MPLS (Multiprotocol Label Switching) is a protocol used in telecommunications networks to efficiently route data packets.
MPLS is a layer 2.5 protocol that operates between traditional layer 2 (Data Link Layer) and layer 3 (Network Layer) protocols.
It uses labels to identify and forward data packets, improving network performance and scalability.
MPLS can be used to create virtual private networks (VPNs) and prioritize traffic based on quality of service (QoS).
Example: In an MP...read more
Q227. Basic configuration steps of output determination
Output determination involves configuring condition records, access sequences, and output types in SAP ERP system.
Define condition tables for output determination
Create access sequences to determine the sequence of condition tables
Assign condition records to access sequences
Configure output types and assign them to access sequences
Test output determination by creating sales orders or invoices
Q228. Difference between flows and process builder
Flows and Process Builder are both automation tools in Salesforce, but Flows are more complex and versatile.
Flows allow for more complex logic and branching than Process Builder
Flows can be initiated by a user or by a trigger, while Process Builder can only be initiated by a trigger
Process Builder is simpler and easier to use for basic automation needs
Both tools can update records, create records, and send emails
Flows can also be used to collect data from users and make decis...read more
Q229. How is memory managed in go programming language?
Memory in Go is managed using garbage collection, which automatically frees up memory that is no longer in use.
Go uses a garbage collector to automatically manage memory allocation and deallocation.
Memory is allocated on the heap, and garbage collection is used to free up memory that is no longer needed.
Pointers are used to reference memory locations, allowing for efficient memory management.
Examples: var x *int = new(int) // allocate memory for an integer pointer
Q230. What do you understand by Supply Chain Management?
Supply Chain Management is the coordination and management of activities involved in the production and delivery of products and services.
It involves planning, sourcing, manufacturing, and delivering products to customers.
It aims to optimize the flow of goods and services, minimize costs, and improve customer satisfaction.
It involves managing relationships with suppliers, distributors, and customers.
Examples include inventory management, transportation management, and demand ...read more
Q231. Explain how you did the digital transformation
Q232. How to deploy application to fiori launchpad
Q233. what are waits in selenium you use in your project
Waits in Selenium are used to ensure that the automation script waits for a certain condition to be met before proceeding.
Implicit Wait: Waits for a certain amount of time before throwing a NoSuchElementException.
Explicit Wait: Waits for a certain condition to be met before proceeding.
Fluent Wait: Waits for a condition with a specified frequency of checking.
Thread.sleep(): Pauses the script execution for a specified amount of time.
Q234. what are classes and objects
Classes are blueprints for creating objects in object-oriented programming. Objects are instances of classes with their own unique attributes and behaviors.
Classes define the properties and behaviors that objects of that class will have
Objects are instances of classes that contain data (attributes) and methods (behaviors)
Classes can inherit properties and behaviors from other classes through inheritance
Example: Class 'Car' may have properties like 'color' and 'model', and met...read more
Q235. Mention where you used polymorphism in framework
Polymorphism is used in framework to achieve flexibility and reusability by allowing objects to be treated as instances of their parent class.
Polymorphism is used in framework to create a common interface for different classes that implement the same method.
It allows different classes to be treated as instances of a common superclass, enabling flexibility in the framework design.
For example, in a test automation framework, polymorphism can be used to create a base class for d...read more
Q236. what are functional interface in java8
Functional interfaces in Java 8 are interfaces with a single abstract method, used for lambda expressions and method references.
Functional interfaces have only one abstract method, but can have multiple default or static methods.
They can be used with lambda expressions and method references.
Examples include java.lang.Runnable, java.util.Comparator, and java.util.function.Predicate.
Q237. What are interceptors? What are clouser ?
Interceptors are functions that can intercept and modify requests or responses in an application. Closures are functions that have access to variables in their outer scope.
Interceptors can be used for logging, authentication, caching, and more.
Closures are commonly used in JavaScript to create private variables and functions.
An example of an interceptor in AngularJS is the $httpInterceptor service.
An example of a closure in JavaScript is a function that returns another functi...read more
Q238. How to hide roles in SAP GRC How you will troubleshoot Fiori issues
To hide roles in SAP GRC, we can use the 'hidden' attribute in the role definition.
Create a new role or edit an existing one in transaction code PFCG
In the 'Authorization' tab, select the 'hidden' checkbox
Save the role and assign it to the relevant user or user group
To troubleshoot Fiori issues, check the Fiori Launchpad logs and use the SAP Fiori App troubleshooting tool
Also, check the backend system logs and ensure that the necessary authorizations are assigned to the user
Q239. What is DML full form
DML stands for Data Manipulation Language.
DML is a subset of SQL (Structured Query Language) used to manipulate data in a database.
It includes commands like INSERT, UPDATE, DELETE, and SELECT.
DML statements are used to add, modify, or delete data in database tables.
For example, INSERT statement is used to add new records, UPDATE statement is used to modify existing records, DELETE statement is used to remove records, and SELECT statement is used to retrieve data from tables.
Q240. What is mean by SCD and explain it's types.
Q241. What is CDD and EDD
CDD stands for Customer Due Diligence and EDD stands for Enhanced Due Diligence.
CDD is a process of verifying the identity of a customer and assessing the risks associated with them.
EDD is a more detailed and thorough process of due diligence that is conducted for high-risk customers.
CDD is mandatory for all customers, while EDD is only required for high-risk customers.
Examples of high-risk customers include politically exposed persons (PEPs), customers from high-risk countri...read more
Q242. Name some commands in Docker and Kubernetes?
Docker commands: run, build, push, pull. Kubernetes commands: create, delete, scale, rollout.
Docker commands: run - to run a container, build - to build an image, push - to push an image to a registry, pull - to pull an image from a registry
Kubernetes commands: create - to create a resource, delete - to delete a resource, scale - to scale a resource, rollout - to manage rollouts and rollbacks
Q243. What you know about budgeting and forcasting?
Budgeting and forecasting involve planning and managing financial resources to achieve organizational goals.
Budgeting involves setting financial goals and allocating resources accordingly
Forecasting involves predicting future financial outcomes based on past data and trends
Budgeting helps in controlling expenses and maximizing profits
Forecasting helps in making informed decisions and planning for future growth
Examples: Creating annual budgets, using financial models to foreca...read more
Q244. What is modulation
Modulation is the process of varying a signal's characteristics to transmit information.
Modulation is used in various communication systems to transmit information over a distance.
It involves varying one or more of the signal's properties such as amplitude, frequency, or phase.
Examples of modulation techniques include amplitude modulation (AM), frequency modulation (FM), and phase modulation (PM).
Q245. Difference b/w discounting and TR?
Discounting and TR are both financial concepts, but they have different meanings and applications.
Discounting refers to the process of determining the present value of future cash flows by applying a discount rate.
TR, on the other hand, stands for Trade Receivables and represents the amount owed to a company by its customers for goods or services provided.
Discounting is a financial calculation used to evaluate investment opportunities or determine the value of future cash flo...read more
Q246. command to get ip address how to change wallpaper on windows
To get IP address, use 'ipconfig' command. To change wallpaper on Windows, right-click on desktop, select 'Personalize', then choose a new wallpaper.
To get IP address, open Command Prompt and type 'ipconfig'
To change wallpaper on Windows, right-click on desktop
Select 'Personalize' from the menu
Choose a new wallpaper from the options
Q247. 1. What is difference between SOF and SOW
SOF stands for Statement of Work, which outlines the scope, deliverables, and timeline of a project. SOW stands for Scope of Work, which details the specific tasks and responsibilities of a project.
SOF focuses on the overall project objectives and outcomes
SOW breaks down the project into specific tasks and responsibilities
SOF is usually more high-level and strategic
SOW is more detailed and operational
Example: SOF might state 'Develop a new website for the company', while SOW ...read more
Q248. Testing process life cycle, challenges faced
Testing process life cycle involves planning, designing, executing, and reporting. Challenges include lack of resources, time constraints, and changing requirements.
Testing process life cycle includes planning, designing, executing, and reporting
Challenges faced include lack of resources, time constraints, and changing requirements
Planning involves identifying test objectives, test scenarios, and test cases
Designing involves creating test data and test environment
Executing in...read more
Q249. difference between list and tuple
List is mutable, tuple is immutable in Python.
List can be modified after creation, tuple cannot
List uses square brackets [], tuple uses parentheses ()
List is used for collections of items that may change, tuple for fixed collections
Q250. what is spark scala and its architecture?
Spark Scala is a distributed computing framework that combines Scala programming language with Apache Spark.
Spark Scala is a programming language that runs on top of the Apache Spark framework.
It provides a high-level API for distributed data processing and analytics.
Spark Scala leverages the power of Scala's functional programming capabilities.
It allows developers to write complex data processing tasks in a concise and expressive manner.
Spark Scala's architecture consists of...read more
Q251. What are set operators ?
Set operators are used to combine the result sets of two or more SELECT statements.
Set operators include UNION, UNION ALL, INTERSECT, and EXCEPT.
UNION combines the results of two SELECT statements and removes duplicates.
UNION ALL combines the results of two SELECT statements and includes duplicates.
INTERSECT returns only the common rows between two SELECT statements.
EXCEPT returns only the rows from the first SELECT statement that are not in the second SELECT statement.
Q252. How to hide roles in SAP GRC
Roles can be hidden in SAP GRC using various methods.
Hiding roles can be achieved by restricting access to the role in the authorization object.
Roles can also be hidden by removing them from the menu or by using transaction codes.
Another method is to use the 'hidden' flag in the role definition.
Roles can also be hidden by using the 'display only' option in the role definition.
It is important to ensure that the hidden roles are still accessible to the appropriate users for mai...read more
Q253. Which field control Document number range in FI
The field control document number range in FI is assigned to each company code.
Field control document number range is used to control the number range of accounting documents.
It is assigned to each company code in FI.
It is used to ensure that accounting documents are numbered sequentially and uniquely.
The number range can be customized based on the company's requirements.
It can be accessed and maintained in transaction code OBH2.
Q254. What is debit and credit note
Debit note and credit note are documents used in accounting to record adjustments made to a transaction.
Debit note is issued when a buyer returns goods to a seller or when there is an overcharge in the invoice.
Credit note is issued when a seller returns goods to a buyer or when there is an undercharge in the invoice.
Debit note increases the buyer's account balance while credit note decreases it.
Credit note increases the seller's account balance while debit note decreases it.
B...read more
Q255. How do you configure fiori launchpad
Q256. What is trust and explain types of trust.
Trust is a belief in the reliability, truth, or ability of someone or something. Types of trust include interpersonal trust, institutional trust, and situational trust.
Interpersonal trust is trust between individuals based on personal relationships and experiences.
Institutional trust is trust in organizations, institutions, or systems, such as government or businesses.
Situational trust is trust that is context-specific and can vary depending on the circumstances.
Examples: Tru...read more
Q257. Linq codes Scenarios for data retrieval
LINQ codes for data retrieval scenarios
Use LINQ to retrieve data from databases, collections, or XML files
Filter data using Where clause
Sort data using OrderBy or OrderByDescending
Group data using GroupBy
Join data from multiple sources using Join
Perform aggregations using Sum, Average, Count, etc.
Q258. how do achieve rank login in talend
To achieve rank login in Talend, you can use the tRank component.
Use the tRank component in Talend to achieve rank login.
Configure the tRank component to specify the input data and the column to rank on.
The tRank component will assign a rank to each row based on the specified column.
You can then use the ranked data for further processing or analysis.
Q259. What is @qualifier annotation ?
The @Qualifier annotation is used in Spring to resolve ambiguity when multiple beans of the same type are present.
It is used to specify which bean should be autowired when multiple beans of the same type are present
It can be used with constructor injection, setter injection, and field injection
It is commonly used in conjunction with @Autowired annotation
Example: @Qualifier("myBean")
Q260. What is amplitude
Amplitude is the measure of the height of a wave from its resting position.
Amplitude is the maximum displacement of a wave from its equilibrium position.
It is measured in units of length, such as meters or feet.
In sound waves, amplitude determines the loudness of the sound.
In light waves, amplitude determines the brightness of the light.
Amplitude can be positive or negative, depending on the direction of the displacement.
Q261. Explain defect life cycle
Defect life cycle is the process of identifying, reporting, prioritizing, fixing, and verifying defects in software.
Defect is identified by testing or user feedback
Defect is reported to development team
Defect is prioritized based on severity and impact
Defect is fixed by development team
Defect fix is verified by testing team
Defect is closed if verified or reopened if not fixed properly
Q262. Y use header file gv one eg
Header files are used to declare functions, variables, and constants that are used in multiple source files.
Header files allow for modular programming and code reuse.
They help to avoid code duplication and reduce errors.
Examples of header files include stdio.h, math.h, and string.h.
Header files are included using the #include preprocessor directive.
Q263. 2. Why KYC needs to be perform on clients
KYC is essential to verify the identity of clients and prevent fraud, money laundering, and terrorist financing.
KYC helps in verifying the identity of clients to ensure they are who they claim to be.
It helps in preventing fraud by identifying suspicious activities and individuals.
KYC also helps in complying with regulatory requirements and preventing money laundering and terrorist financing.
It helps in building trust with clients and maintaining a good reputation in the marke...read more
Q264. How does react works ?
React is a JavaScript library for building user interfaces.
React uses a virtual DOM to efficiently update the UI.
It allows for reusable components and declarative programming.
React can be used with other libraries and frameworks.
It uses JSX syntax to combine HTML and JavaScript.
React is maintained by Facebook and has a large community of developers.
Examples of companies using React include Netflix, Airbnb, and Dropbox.
Q265. Find duplicates from integer list using java 8 stream
Using Java 8 stream to find duplicates in an integer list
Convert the integer list to a stream using stream() method
Use Collectors.groupingBy() to group elements by their occurrences
Filter the map entries to find duplicates by checking for values greater than 1
Q266. How do you prevent data leakage
Prevent data leakage by implementing access controls, encryption, monitoring, and employee training.
Implement access controls to limit who can access sensitive data
Use encryption to protect data in transit and at rest
Monitor network activity for suspicious behavior
Train employees on data security best practices
Regularly update software and security protocols
Perform regular security audits to identify vulnerabilities
Q267. Difficulties I have faced during during ETL pipelines
I have faced difficulties in handling large volumes of data, ensuring data quality, and managing dependencies in ETL pipelines.
Handling large volumes of data can lead to performance issues and scalability challenges.
Ensuring data quality involves dealing with data inconsistencies, errors, and missing values.
Managing dependencies between different stages of the ETL process can be complex and prone to failures.
Q268. What I'd diff between git fetch and git pull
git fetch downloads changes from the remote repository, while git pull downloads changes and merges them into the current branch.
git fetch only downloads changes from the remote repository, but does not merge them into the current branch
git pull downloads changes from the remote repository and merges them into the current branch
git fetch is useful for reviewing changes before merging, while git pull is a shortcut for fetching and merging in one command
Q269. What is cassandra and what is it used for.
Cassandra is a distributed NoSQL database management system designed for handling large amounts of data across multiple servers.
Cassandra is used for storing and managing large amounts of structured data across multiple commodity servers.
It provides high availability and fault tolerance with no single point of failure.
Cassandra is commonly used for real-time analytics, IoT data, messaging platforms, and more.
It uses a decentralized architecture with a masterless design, allow...read more
Q270. Expense which is incurred but yet to be paid
Accrued expenses are costs that have been incurred but not yet paid.
Accrued expenses are recorded as liabilities on the balance sheet
Examples include salaries payable, interest payable, and taxes payable
Accrued expenses are typically recognized through adjusting journal entries at the end of an accounting period
Q271. What is human resource management
Human resource management is the process of managing an organization's employees and their work environment.
It involves recruitment, training, performance evaluation, and compensation of employees.
HRM also includes creating policies and procedures to ensure compliance with labor laws and regulations.
Effective HRM can improve employee satisfaction, productivity, and retention.
Examples of HRM tasks include conducting job interviews, developing employee training programs, and ma...read more
Q272. Steps you'll take to optimize a datastage job.
To optimize a DataStage job, follow these steps:
Identify and eliminate unnecessary stages or transformations
Reduce the amount of data being processed by filtering or aggregating
Use parallel processing to improve performance
Optimize the use of system resources such as memory and disk space
Tune database connections and queries for better performance
Q273. Rest API callouts , methods to enable in apex
To enable REST API callouts in Apex, use Http classes and methods.
Use Http classes and methods like Http, HttpRequest, HttpResponse, etc.
Set the endpoint URL and HTTP method in the HttpRequest object.
Use the send() method of the Http class to send the request and get the response.
Handle the response using HttpResponse methods like getBody(), getStatusCode(), etc.
Q274. difference between TCP and UDP? SSL Handshake, TCP handshake
TCP is connection-oriented, reliable, and slower, while UDP is connectionless, unreliable, and faster.
TCP is connection-oriented, meaning a connection is established before data transfer, ensuring reliability.
UDP is connectionless, meaning data is sent without establishing a connection, making it faster but less reliable.
TCP uses a three-way handshake for connection establishment, while UDP does not have a handshake process.
TCP is used for applications that require reliable d...read more
Q275. What are the ways to invoke a servlet in AEM
There are multiple ways to invoke a servlet in AEM, including using Sling Servlets, ResourceType-based Servlets, and ServletResolver.
Using Sling Servlets by registering the servlet with a specific path
Using ResourceType-based Servlets by associating the servlet with a specific resource type
Using ServletResolver to dynamically resolve servlets based on request paths
Q276. Explain exception handling
Exception handling is a mechanism to handle errors or exceptional situations in a program.
It allows the program to gracefully handle errors without crashing.
Exceptions can be caught and handled using try-catch blocks.
Common exceptions include NullPointerException, ArrayIndexOutOfBoundsException, and IOException.
Exception handling helps in debugging and maintaining code.
It separates error-handling code from normal code execution.
Q277. hashmap working in collections
HashMap is a data structure in Java that stores key-value pairs and provides fast retrieval of values based on keys.
HashMap is part of the Java Collections framework.
It allows null keys and values.
HashMap uses hashing to store and retrieve elements efficiently.
Example: HashMap
map = new HashMap<>();
Q278. What are BADIs and User Exits
BADIs and User Exits are ways to enhance SAP standard functionality.
BADIs (Business Add-Ins) are enhancement points in SAP that allow custom code to be executed during standard processes.
User Exits are similar to BADIs, but are specific to certain SAP modules and are implemented using function modules.
Both BADIs and User Exits are used to add custom functionality to SAP without modifying standard code.
Examples of using BADIs and User Exits include adding custom fields to SAP ...read more
Q279. How to add rotating images toh the page
Use a carousel plugin like Slick or Owl Carousel to add rotating images to the page.
Choose a carousel plugin like Slick or Owl Carousel
Include the necessary CSS and JS files in your HTML
Create a container element for the images with appropriate classes
Initialize the carousel plugin with the desired options
Add images to the container element to display them in a rotating manner
Q280. What are the tool you used
I have used a variety of tools such as project management software, communication platforms, and data analysis tools.
Project management software (e.g. Trello, Asana)
Communication platforms (e.g. Slack, Microsoft Teams)
Data analysis tools (e.g. Excel, Tableau)
Q281. Difference between linkedlist and arraylist Difference between set and list
LinkedList and ArrayList are both implementations of the List interface in Java. LinkedList uses pointers to connect elements, while ArrayList uses a dynamic array to store elements.
LinkedList uses pointers to connect elements, allowing for efficient insertion and deletion operations.
ArrayList uses a dynamic array to store elements, providing fast random access to elements.
LinkedList is better suited for frequent insertions and deletions, while ArrayList is better for frequen...read more
Q282. different types of exceptions we face during automation
Various types of exceptions in automation testing
Checked exceptions
Unchecked exceptions
Timeout exceptions
Element not found exceptions
Stale element reference exceptions
Invalid element state exceptions
Element not interactable exceptions
Q283. Explain You’re Project Framework
Our project framework is based on Agile methodology with emphasis on continuous integration and delivery.
We follow Agile methodology for project management
We use continuous integration and delivery for faster and efficient development
We have a well-defined testing process for ensuring quality
We use tools like JIRA, Jenkins, and Selenium for project management and testing
We have a dedicated team for automation testing
Q284. What is accounts payable
Accounts payable refers to the amount of money a company owes to its suppliers or vendors for goods or services received but not yet paid for.
Accounts payable is a liability on the company's balance sheet.
It represents the short-term debt owed by the company.
It includes invoices from suppliers, utility bills, and other expenses.
Accounts payable is typically recorded as a current liability.
It is an important aspect of cash flow management and working capital.
Companies often ha...read more
Q285. What is po and non po
PO stands for Purchase Order and Non-PO refers to transactions that do not require a purchase order.
PO is a document that is issued by a buyer to a seller to initiate a purchase transaction.
Non-PO transactions are usually smaller purchases that do not require a formal purchase order.
PO transactions are typically more formal and involve a longer process of approval and documentation.
Non-PO transactions are usually approved more quickly and involve less paperwork.
Examples of PO...read more
Q286. What is gr and ir in sap
GR and IR are two important processes in SAP for goods receipt and invoice receipt.
GR (Goods Receipt) is the process of receiving goods into a warehouse or plant from an external vendor or production line.
IR (Invoice Receipt) is the process of receiving an invoice from a vendor for goods or services received.
GR and IR are closely linked as the goods receipt must be completed before the invoice receipt can be processed.
SAP has specific transactions for both GR and IR processes...read more
Q287. what is the difference between SAP S4 / ERP module
SAP S4 is the next-generation business suite, while ERP module is a broader term encompassing various business processes.
SAP S4 is a more advanced version of SAP ERP, offering improved user experience and functionality.
SAP S4HANA is built on the SAP HANA platform, allowing for real-time data processing and analytics.
ERP module refers to a specific component within the SAP system, such as finance, sales, or human resources.
SAP ERP includes various modules like SAP FI (Financia...read more
Q288. What is use
Use is the purpose or function of something.
Use defines the intended purpose of a product or service.
It helps users understand how to utilize the product effectively.
Use can also refer to the act of employing something for a specific task.
For example, the use of a hammer is to drive nails into wood.
Q289. What is jdbctemplate ?
jdbctemplate is a class in Spring Framework that simplifies the use of JDBC while handling exceptions and boilerplate code.
It is used to perform database operations such as querying, updating, and deleting data.
It provides methods for executing SQL statements and mapping results to Java objects.
It handles exceptions and releases resources automatically.
Example: jdbcTemplate.queryForObject("SELECT COUNT(*) FROM users", Integer.class);
Q290. What are marker interfaces?
Marker interfaces are interfaces with no methods, used to mark a class as having a certain property or behavior.
Marker interfaces are used to provide metadata about a class.
They are used to indicate that a class implements a certain behavior or has a certain property.
Examples include Serializable, Cloneable, and Remote interfaces in Java.
Marker interfaces can also be used to trigger specific behavior in frameworks or libraries.
They are often used in combination with reflectio...read more
Q291. What is sql ? What are joins ?
SQL is a programming language used to manage and manipulate relational databases. Joins are used to combine data from multiple tables.
SQL stands for Structured Query Language
It is used to create, modify, and query databases
Joins are used to combine data from two or more tables based on a related column
Types of joins include inner join, left join, right join, and full outer join
Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column
Q292. serialization and deserialization in java
Serialization is the process of converting an object into a byte stream, while deserialization is the process of converting a byte stream back into an object in Java.
Serialization is achieved by implementing the Serializable interface in Java.
Deserialization is done by reading the byte stream and reconstructing the object using the readObject() method.
Example: ObjectOutputStream for serialization and ObjectInputStream for deserialization.
Q293. What is default methods in spring
Default methods in Spring allow interfaces to have method implementations.
Default methods were introduced in Java 8 to allow interfaces to have method implementations.
In Spring, default methods can be used in interfaces to provide a default implementation for a method.
Default methods can be overridden by classes that implement the interface if needed.
Q294. Configuration and mount points for Linux servers
Configuration and mount points are crucial for efficient Linux server management.
Configuration files are located in /etc directory
Mount points are directories where file systems are mounted
Common mount points include /, /boot, /home, /var, /tmp
fstab file is used to configure mount points at boot time
Q295. Sliding Window find the subarray with sum equal to k
Using sliding window technique to find subarray with sum equal to k.
Initialize two pointers at the start of the array.
Move the right pointer to expand the window until the sum is greater than or equal to k.
Move the left pointer to shrink the window if the sum exceeds k.
Repeat until the end of the array is reached.
Example: Input array [1, 4, 20, 3, 10, 5], k=33. Output: [20, 3, 10].
Q296. What is hoisting in Java script
Hoisting in JavaScript is a behavior where variable and function declarations are moved to the top of their containing scope during the compilation phase.
Variable declarations are hoisted to the top of their scope, but not their initializations.
Function declarations are fully hoisted, including their definitions.
Hoisting can lead to unexpected behavior if not understood properly.
Q297. Using goroutine, print even and odd numbers upto 100
Using goroutine to print even and odd numbers upto 100
Create two goroutines, one for printing even numbers and one for printing odd numbers
Use a channel to communicate between the goroutines
Loop through numbers 1 to 100 and send them to the appropriate goroutine for printing
Q298. Explain various file operations performed in Unix
Q299. What is hadoop and its architecture?
Hadoop is a distributed processing framework used for storing and processing large datasets across clusters of computers.
Hadoop is designed to handle big data by distributing the workload across multiple machines.
It consists of two main components: Hadoop Distributed File System (HDFS) and MapReduce.
HDFS is a distributed file system that stores data across multiple nodes in a cluster.
MapReduce is a programming model used for processing and analyzing the data stored in HDFS.
Ha...read more
Q300. What are constraints?
Constraints are rules that are applied to a table column or a group of columns.
Constraints ensure data accuracy and consistency in a database.
They can be used to enforce rules like uniqueness, primary key, foreign key, etc.
Constraints can be added when creating a table or altered later using ALTER TABLE statement.
Examples of constraints include NOT NULL, CHECK, UNIQUE, PRIMARY KEY, FOREIGN KEY, etc.
More about working at IBM
Top HR Questions asked in Beebom
Interview Process at Beebom
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month