IBM
80+ Shajay Fabricators & Engineers Interview Questions and Answers
Q1. Star Pattern Problem Statement
Display the star pattern for a given positive integer N.
Example:
Input:
N = 4
Output:
*
***
*****
*******
Explanation:
The dots in the image represent spaces. Align the stars in...read more
Q2. How will respond when you are the only one available on weekend , whenever there are client pings or user pings
I will prioritize urgent client or user pings and respond promptly to address their needs.
Prioritize urgent client or user pings over non-urgent ones
Respond promptly to address their needs
Communicate with the client or user to understand the issue and provide assistance
Document the issue and resolution for future reference
Q3. Given string/sentence need to be reversed and the vowels need to be replaced with numbers from 1-9.In the reversed string replaced numbers should appear in descending order from left to right .If there are more...
read moreReverse a string and replace vowels with numbers in descending order. Restart numbering if more than 9 vowels.
Reverse the given string using built-in functions or loops
Create a dictionary to map vowels to numbers from 1-9
Iterate through the reversed string and replace vowels with numbers from the dictionary
If there are more than 9 vowels, restart numbering from 1
Sort the replaced numbers in descending order from left to right
Q4. Design a system for railway ticket booking
Design a system for railway ticket booking
Create a user-friendly interface for booking tickets
Integrate payment gateway for secure transactions
Implement seat availability and reservation system
Include features for cancellation and refund
Develop a database to store user and ticket information
Q5. How to compare 2 files(file handling)
To compare 2 files in file handling, read both files line by line and compare each line.
Read both files line by line
Compare each line of the files
Handle cases where files have different number of lines
Use file handling functions like fopen, fgets, and fclose
Q7. Aws cloud services name a few
AWS offers a wide range of cloud services for various purposes.
Compute services: EC2, Lambda
Storage services: S3, EBS
Database services: RDS, DynamoDB
Networking services: VPC, Route 53
Security services: IAM, KMS
Analytics services: Redshift, EMR
AI/ML services: SageMaker, Rekognition
Q8. Aws cloud pillars name a few
AWS cloud pillars are the foundation of AWS cloud computing services.
Security - ensuring data protection and privacy
Reliability - ensuring system availability and fault tolerance
Performance Efficiency - optimizing resource utilization and scalability
Cost Optimization - minimizing costs while maximizing benefits
Q9. What is the DBMS and What is use of DBMS?
DBMS stands for Database Management System. It is used to manage and organize data in a structured manner.
DBMS is a software system that allows users to define, create, maintain and control access to databases.
It provides a way to store and retrieve data efficiently and effectively.
DBMS helps in maintaining data integrity, security and consistency.
Examples of DBMS include MySQL, Oracle, SQL Server, MongoDB, etc.
Q10. Any questions?
Yes, I have a few questions regarding the company culture and team dynamics.
Can you tell me more about the team structure and how collaboration is encouraged?
What is the company's approach to professional development and growth?
How does the company prioritize work-life balance for its employees?
Q11. Replace a sub-string in a string.
To replace a sub-string in a string, use the replace() method.
Use the replace() method with the old sub-string and new sub-string as arguments.
The replace() method only replaces the first occurrence of the sub-string by default.
To replace all occurrences, use a regular expression with the global flag.
Example: 'hello world'.replace('world', 'universe') returns 'hello universe'.
Example: 'hello world'.replace(/world/g, 'universe') returns 'hello universe'.
Q12. Two Sum: given 2 numbers, check if there exists 2 numbers such that they sum to target
Given an array of numbers, check if there exists two numbers that sum to a target number.
Use a hash set to store the complement of each number as you iterate through the array.
For each number, check if its complement exists in the hash set.
If the complement exists, return true. Otherwise, add the number to the hash set.
If no two numbers sum to the target, return false.
Q13. What is the MVC?Describe in brief.
MVC stands for Model-View-Controller. It is a software design pattern used to separate an application's concerns.
Model represents the data and business logic
View displays the data to the user
Controller handles user input and updates the model and view accordingly
MVC promotes separation of concerns and modularity
Examples include Ruby on Rails, ASP.NET MVC, and Spring MVC
Q14. What is CRM? WHAT WORK FLOW?
CRM stands for Customer Relationship Management. It is a software that helps businesses manage their interactions with customers.
CRM helps businesses organize customer data and interactions
It can track sales, marketing campaigns, and customer support
Examples of CRM software include Salesforce, HubSpot, and Zoho CRM
Q15. Write a program for highest odd number from 1 - 100 in java
Program to find the highest odd number from 1-100 in Java
Loop through numbers 1-100
Check if the number is odd
If it is odd, check if it is greater than the current highest odd number
If it is, update the current highest odd number
Return the highest odd number
Q16. How to find badis, different between user exit and customer exit
Badis can be found using transaction code SE18. User exits are older and customer exits are newer enhancements in SAP.
Badis can be found using transaction code SE18.
User exits are older enhancements in SAP.
Customer exits are newer enhancements in SAP.
Badis provide a more flexible and object-oriented approach compared to user exits and customer exits.
Badis can be implemented multiple times, while user exits and customer exits can only be implemented once.
Badis are implemented ...read more
Q17. What do you know about DITA XML, which tags have you used in your documents, what are keywords, and what is DITA mapping, have you ever created graphics or illustrations, types of DITA topics, benefits of DITA,...
read moreDITA XML is a structured content standard used for creating technical documentation.
DITA XML is a structured content standard for technical documentation
Commonly used tags include <topic>, <title>, <body>, <section>
Keywords are used to categorize content for easy retrieval
DITA mapping is the process of linking topics together in a hierarchy
Graphics and illustrations can be created and included in DITA documents
Types of DITA topics include concept, task, reference
Benefits of D...read more
Q18. What is Android development
Android development is the process of creating applications for the Android operating system.
Android development involves writing code in Java or Kotlin to create mobile applications.
It includes designing user interfaces, implementing functionality, and testing the app.
Developers use Android Studio, an integrated development environment (IDE), for building Android apps.
Android apps can be published on the Google Play Store and run on various devices.
Examples of Android apps i...read more
Q19. What is use of activity creator
The activity creator is used to create instances of an activity class in Android development.
The activity creator is responsible for instantiating an activity class.
It is typically used when starting a new activity from another activity.
The activity creator can pass data to the new activity through intent extras.
It is commonly used in the onCreate() method of the calling activity.
Example: Intent intent = new Intent(this, SecondActivity.class); startActivity(intent);
Q20. Write a program for finding postion of 'r' in program
Program to find position of 'r' in a given string
Use a loop to iterate through each character in the string
Check if the current character is 'r'
If it is, return the index of that character
If 'r' is not found, return -1
Q21. Difference between session method and call transaction
Session method and call transaction are two different ways of executing SAP transactions.
Session method executes a transaction in the same session as the calling program.
Call transaction executes a transaction in a separate session.
Session method is faster and more efficient as it does not require opening a new session.
Call transaction is useful when the transaction being executed has its own set of screens and requires user input.
Session method is used when the transaction b...read more
Q22. What is design thinking, have you ever communicated with developers, what do you do when you do not have enough information but the deadline is already near?
Design thinking is a problem-solving approach that focuses on understanding the user's needs and creating innovative solutions.
Design thinking involves empathizing with users, defining the problem, ideating solutions, prototyping, and testing.
Yes, I have communicated with developers to understand technical aspects and constraints of the project.
When lacking information near a deadline, I prioritize the most critical aspects, communicate with stakeholders for clarification, an...read more
Q23. How do you receive input, what are DDLC and SDLC, what style guides have you used for creating documents, how do you ensure accuracy in your document.
I receive input through meetings and emails, DDLC is Document Development Life Cycle, SDLC is Software Development Life Cycle, I use APA and Chicago style guides, I ensure accuracy through thorough research and review.
Receive input through meetings with subject matter experts and stakeholders
DDLC (Document Development Life Cycle) is the process of creating, editing, and publishing documents
SDLC (Software Development Life Cycle) is the process of developing software from plann...read more
Q24. RFC how to trigger an RFC
To trigger an RFC, use the function module 'RFC_FUNCTION_CALL'.
Provide the RFC name and input parameters in the 'RFC_FUNCTION_CALL' function module.
Use the 'DESTINATION' parameter to specify the target system.
Call the function module using 'CALL FUNCTION'.
Q25. How to enhance standard table
To enhance a standard table in SAP ABAP, use append structures or custom fields.
Create an append structure to add fields to the standard table without modifying it directly.
Use custom fields to add new fields to the table.
Enhance the table using the Enhancement Framework.
Use BAdIs (Business Add-Ins) to add custom logic to the standard table.
Examples: Append structure for MARA table to add custom fields for material master data.
Custom fields added to VBAK table for sales order...read more
Q26. what is lan, network provider, speak on any topic for 5 min
LAN is a local area network that connects devices within a limited area. Network providers offer internet services to customers.
LAN is a computer network that covers a small geographic area, such as a home, office, or building.
It allows devices to communicate with each other and share resources like printers and files.
Network providers offer internet services to customers, such as cable, DSL, or fiber optic connections.
They provide the infrastructure and technology necessary ...read more
Q27. What do you know of Agile Methodology and Scrum?
Agile Methodology and Scrum are popular project management frameworks used in software development.
Agile Methodology is a flexible approach to software development that emphasizes incremental delivery, collaboration, and continuous improvement.
Scrum is a specific Agile framework that divides work into sprints, with daily stand-up meetings and regular reviews.
Scrum roles include Product Owner, Scrum Master, and Development Team.
Scrum artifacts include Product Backlog, Sprint B...read more
Q28. Have you worked with any version control systems?
Yes, I have experience working with version control systems.
I have used Git for version control in my previous roles.
I am familiar with branching, merging, and resolving conflicts in Git.
I have also worked with SVN (Subversion) in the past.
Q29. Implicit and explicit enhancement
Implicit and explicit enhancements in SAP ABAP
Implicit enhancements are modifications made to standard SAP code without changing the original code
Explicit enhancements are modifications made to standard SAP code by adding new code to the original code
Implicit enhancements are done using function modules, while explicit enhancements are done using enhancement points
Implicit enhancements are not visible in the standard SAP code, while explicit enhancements are visible in the st...read more
Q30. Explain features of Android development
Android development features include open-source platform, rich development environment, and extensive libraries.
Open-source platform allows for customization and flexibility
Rich development environment with tools like Android Studio
Extensive libraries for various functionalities like UI, networking, and database
Support for multiple hardware devices and screen sizes
Integration with Google services like Maps, Firebase, and Play Store
Ability to create interactive and engaging u...read more
Q31. What is java
Java is a high-level programming language used for developing a wide range of applications, including Android apps.
Java is an object-oriented language.
It is platform-independent, meaning it can run on any operating system.
Java uses a virtual machine called the Java Virtual Machine (JVM) to execute code.
It has a large standard library with built-in classes and methods for common programming tasks.
Java is known for its simplicity, readability, and robustness.
Q32. What is meant by accounts payable?
Accounts payable refers to the amount of money a company owes to its suppliers or vendors for goods or services received.
Accounts payable is a liability on the balance sheet.
It represents the company's short-term obligations to pay for goods or services.
It includes invoices, bills, and other payment obligations.
Accounts payable is typically recorded when goods or services are received, but payment has not yet been made.
Examples of accounts payable include utility bills, inven...read more
Q33. What is abstract class
An abstract class is a class that cannot be instantiated and is used as a base class for other classes.
An abstract class can have abstract methods that must be implemented by its subclasses.
Abstract classes can have non-abstract methods and properties.
An abstract class can be used to define a common interface for a group of related classes.
Example: 'Animal' can be an abstract class with abstract methods like 'eat' and 'move', which must be implemented by its subclasses like '...read more
Q34. Multiple inheritance in oo abap
Multiple inheritance allows a class to inherit from multiple superclasses in OO ABAP.
Multiple inheritance can be achieved using interfaces.
A class can implement multiple interfaces.
A class can inherit from one superclass and implement multiple interfaces.
Example: Class ZCL_MYCLASS extends ZCL_SUPERCLASS implements ZIF_INTERFACE1, ZIF_INTERFACE2.
Diamond problem can occur in multiple inheritance.
To avoid diamond problem, use interface inheritance instead of class inheritance.
Q35. What are the golden rules
The golden rules of accounting are basic principles that guide the recording of financial transactions.
The first golden rule is the rule of debit and credit.
The second golden rule is the rule of assets and liabilities.
The third golden rule is the rule of income and expenses.
These rules ensure accuracy and consistency in financial reporting.
For example, if a company purchases inventory on credit, the rule of debit and credit dictates that the inventory account is debited and t...read more
Q36. What kind of techniques that applies in industry ?
Q37. List out all the steps that are needed to be followed in order to switch Chrome settings to default.
To switch Chrome settings to default, follow these steps.
Open Chrome settings
Scroll down and click on 'Advanced'
Scroll down further and click on 'Reset settings'
Confirm the reset by clicking on 'Reset' button
Q38. What is asynchronous And synchronous
Asynchronous and synchronous are programming concepts that determine how tasks are executed.
Synchronous tasks are executed one after the other, in a sequential manner.
Asynchronous tasks can be executed simultaneously, without waiting for the previous task to complete.
Synchronous tasks are easier to understand and debug, while asynchronous tasks are more efficient and can improve performance.
Examples of synchronous tasks include reading a file or waiting for user input, while ...read more
Q39. What is interface
An interface is a contract between two systems or components that defines the methods and parameters that they will use to communicate with each other.
Interfaces allow for loose coupling between systems or components
They define a set of rules for communication
Interfaces can be used in programming languages like Java and C#
Examples of interfaces include JDBC for database connectivity and SOAP for web services
Q40. Field symbol in ABAP
Field symbol is a pointer to a field in ABAP.
Field symbol is used to access data dynamically.
It can be used to avoid copying large amounts of data.
It can be used to access data in internal tables and structures.
Example: ASSIGN statement assigns a field symbol to a field.
Example: LOOP AT statement uses a field symbol to access data in internal tables.
Q41. What is the Java code for comparing two strings for equality?
Use the equals() method in Java to compare two strings for equality.
Use the equals() method to compare two strings for equality.
Example: String str1 = "hello"; String str2 = "hello"; if(str1.equals(str2)) { // strings are equal }
Q42. What is 3 golden rules of accounting
The 3 golden rules of accounting are: 1. Debit the receiver, credit the giver. 2. Debit what comes in, credit what goes out. 3. Debit expenses and losses, credit income and gains.
Rule 1: Debit the receiver, credit the giver. This means that when an asset is received, it is debited, and when a liability is given, it is credited.
Rule 2: Debit what comes in, credit what goes out. This means that when there is an inflow of assets, it is debited, and when there is an outflow of as...read more
Q43. Explain how will you handle a client who is facing performance issue on BPM
I will analyze the issue, identify the root cause, and provide a solution to improve performance.
Gather information about the issue and the client's environment
Analyze the data to identify the root cause of the performance issue
Provide recommendations to improve performance, such as optimizing processes or increasing resources
Work with the client to implement the solution and monitor the results
Provide ongoing support and maintenance to ensure continued performance improvemen...read more
Q44. What is depreciation and it's types
Depreciation is the decrease in value of an asset over time due to wear and tear, obsolescence or other factors.
Depreciation is a non-cash expense that reduces the value of an asset on the balance sheet
There are three types of depreciation: straight-line, accelerated, and units of production
Straight-line depreciation is when the asset loses an equal amount of value each year
Accelerated depreciation is when the asset loses more value in the early years and less in the later ye...read more
Q45. How will u reverse a binary tree(not BST)?
To reverse a binary tree, swap the left and right subtrees recursively starting from the root node.
Start by swapping the left and right subtrees of the root node
Recursively swap the left and right subtrees of each node
Stop when you reach the leaf nodes
Example: 1 1 / \ / \ 2 3 3 2
Example: A A / \ / \ B C C B / \ / \ / \ / \ D E F G G F E
Q46. Singleton pattern in oo ABAP
Singleton pattern is a design pattern that restricts the instantiation of a class to one object.
Singleton pattern ensures that only one instance of a class is created and provides a global point of access to it.
It is useful when exactly one object is needed to coordinate actions across the system.
In ABAP, singleton pattern can be implemented using static attributes and methods.
Example: class CL_SING_ABAP implementing singleton pattern.
Ensure thread safety by using locks or at...read more
Q47. what are hyperparameters in random forest
Hyperparameters in random forest are parameters that are set before the learning process begins.
Hyperparameters control the behavior of the random forest algorithm.
They are set by the data scientist and are not learned from the data.
Examples of hyperparameters in random forest include the number of trees, the maximum depth of trees, and the number of features considered at each split.
Q48. what the purpose of Grep and how to setup S3 on AIX
Grep is a command-line utility for searching text files for specific patterns. S3 on AIX is a cloud storage service.
Grep is used to search for specific patterns in text files
S3 on AIX can be set up using the AWS CLI or SDK
Configure the AWS CLI with access keys and region information
Create an S3 bucket using the AWS CLI or SDK
Upload files to the S3 bucket using the AWS CLI or SDK
Q49. How many type of LV should we have on Enterprise Env
There should be two types of LV on Enterprise Env - root LV and data LV.
Root LV is used for booting the system and should be small in size.
Data LV is used for storing data and should be larger in size.
Having separate LVs for root and data helps in better management and maintenance of the system.
Other types of LVs can be added based on specific requirements of the enterprise environment.
Q50. Write a one line code to find if a given number is a power of 2
Check if a number is a power of 2 in one line of code.
Use bitwise AND operator to check if the number is greater than 0 and has only one bit set to 1.
If the number is a power of 2, it will have only one bit set to 1 in its binary representation.
Example: (n & (n-1)) == 0 will return true if n is a power of 2.
Q51. Tell me about a time you had to do a data analysis
I analyzed customer feedback data to identify areas of improvement for a software product.
Collected customer feedback data through surveys and online reviews
Used Excel to organize and analyze the data
Identified common themes and issues mentioned by customers
Presented findings to the product development team for action
Implemented changes based on the analysis to improve customer satisfaction
Q52. How does a floating point number is stored ?
Floating point numbers are stored using a combination of a sign bit, an exponent, and a mantissa.
A floating point number is represented in binary form.
The first bit represents the sign of the number (0 for positive, 1 for negative).
The next few bits represent the exponent, which determines the scale of the number.
The remaining bits represent the mantissa, which contains the significant digits of the number.
The IEEE 754 standard is commonly used for floating point representati...read more
Q53. What is in internet browse?
An internet browser is a software application used to access and view websites on the internet.
An internet browser allows users to navigate the internet by entering website addresses or using search engines.
It displays web pages in a graphical user interface and allows users to interact with the content.
Popular internet browsers include Google Chrome, Mozilla Firefox, Microsoft Edge, and Safari.
Internet browsers also have features such as bookmarks, history, and extensions to...read more
Q54. What is BRS and it uses
BRS stands for Business Requirement Specification. It is a document that outlines the requirements for a project or product.
BRS is used to clearly define the scope and objectives of a project or product
It helps to ensure that all stakeholders have a common understanding of the requirements
BRS can be used as a reference throughout the project to ensure that it stays on track
Examples of information included in a BRS are functional requirements, non-functional requirements, and ...read more
Q55. How will u generate PID of a process ?
PID of a process can be generated using various commands in different operating systems.
In Linux, use the 'ps' command to get the process ID
In Windows, use the 'tasklist' command to get the process ID
In macOS, use the 'top' command to get the process ID
In Python, use the 'os.getpid()' function to get the process ID
Q56. Golden rule and explain each and give examples each
The golden rule is a moral principle that states one should treat others as one would like others to treat oneself.
Golden rule: Treat others as you would like to be treated.
Explanation: This principle encourages empathy and kindness towards others.
Example: If you want people to be honest with you, you should also be honest with them.
Golden rule: Do not do to others what you would not want done to you.
Explanation: This principle emphasizes avoiding harm or hurt to others.
Examp...read more
Q57. How many programming languages do you know?
I am proficient in three programming languages: Java, Python, and C++.
Proficient in Java, Python, and C++
Experience in developing applications using Java
Familiarity with Python libraries such as NumPy and Pandas
Knowledge of C++ programming concepts such as pointers and templates
Q58. how to perform lifecyle mehthods in functional components
Q59. What is working capital and formula
Working capital is the difference between current assets and current liabilities, representing a company's ability to meet short-term obligations.
Working capital = Current Assets - Current Liabilities
It measures a company's liquidity and operational efficiency
Positive working capital indicates a company can cover its short-term liabilities
Negative working capital may indicate financial trouble or inefficiency
Examples: Cash, accounts receivable, inventory are current assets. A...read more
Q60. What is Goods requisition
Goods requisition is the process of requesting and obtaining necessary items or materials for a particular purpose.
It involves identifying the required goods or materials
It involves submitting a request for the goods or materials
It involves obtaining the goods or materials once the request is approved
Examples include requisition of office supplies, equipment, or raw materials for production
Q61. Modify Dijkstra algorithm to find 3 Shortest path
Modify Dijkstra algorithm to find 3 shortest paths
Implement a modified version of Dijkstra's algorithm that keeps track of the 3 shortest paths
Use a priority queue to store the nodes and their distances from the source node
When a node is visited, update the distances of its neighbors and add them to the priority queue
Keep track of the 3 shortest paths using an array or a list
Terminate the algorithm when the 3 shortest paths have been found or when the priority queue is empty
Q62. What is Risk modules?
Risk modules are components or sections within a risk management system that focus on specific areas of risk assessment and mitigation.
Risk modules help in identifying, analyzing, and managing risks in different domains.
Examples of risk modules include credit risk module, market risk module, operational risk module, etc.
Each module is designed to address specific types of risks and may have its own set of tools, methodologies, and models.
Risk modules provide a structured appr...read more
Q63. how to do QnA system with LLM
A QnA system with LLM is a system that uses the Language Model for Information Retrieval and Question Answering.
Preprocess the input question and convert it into a format suitable for the LLM model.
Fine-tune the LLM model on a dataset of question-answer pairs.
Use the fine-tuned model to generate answers for new questions.
Evaluate the performance of the QnA system using metrics like precision, recall, and F1 score.
Iteratively improve the system by refining the training data an...read more
Q64. Sort array in 0(n) time complexity
Use counting sort algorithm to achieve O(n) time complexity.
Count the frequency of each string in the array.
Create a new array based on the frequency counts.
Iterate through the new array to reconstruct the sorted array.
Q65. What are the network topologies?
Network topologies refer to the arrangement of various elements in a network.
There are several types of network topologies, including bus, star, ring, mesh, and hybrid.
Bus topology involves connecting all devices to a single cable.
Star topology involves connecting all devices to a central hub or switch.
Ring topology involves connecting devices in a circular manner.
Mesh topology involves connecting devices to each other in a network.
Hybrid topology is a combination of two or m...read more
Q66. How many types I receive payment
There are multiple types of payment methods that can be received.
Cash
Credit card
Debit card
Online payment
Bank transfer
Q67. what is database, system design
A database is a structured collection of data, while system design involves creating a plan for how different components of a system will work together.
Database is used to store and organize data in a structured manner.
System design involves creating a plan for how different components of a system will interact and work together efficiently.
Examples of databases include MySQL, PostgreSQL, and MongoDB.
Examples of system design considerations include scalability, reliability, a...read more
Q68. how to do unit testing
Unit testing is a process of testing individual units of code to ensure they function correctly.
Write test cases for each unit of code
Test inputs, outputs, and edge cases
Use testing frameworks like JUnit or pytest
Automate tests to run regularly
Ensure tests are independent, isolated, and repeatable
Q69. how to instalation new server?
To install a new server, follow these steps:
Choose the appropriate hardware and operating system
Configure network settings
Install necessary software packages
Set up security measures
Configure backups and monitoring
Test the server to ensure it is functioning properly
Q70. What is accrual and it's entry
Accrual is an accounting method where revenue or expenses are recognized when earned or incurred, regardless of when payment is received or made.
Accrual accounting is the opposite of cash accounting
Accruals are recorded as adjusting entries in the general ledger
Examples of accruals include interest expense, salaries payable, and accounts receivable
The entry for an accrual involves debiting an expense account and crediting a liability account
Q71. What is cursor and its types
A cursor is a database object used to manipulate data in a result set.
A cursor is used to retrieve data from a database one row at a time.
There are two types of cursors: implicit and explicit.
Implicit cursors are used for single-row queries, while explicit cursors are used for multi-row queries.
Examples of explicit cursors include FOR LOOP and OPEN-FOR-FETCH-CLOSE.
Cursors can be used to update, delete, or insert data into a database.
Q72. What is workload in linux
Workload in Linux refers to the amount of work being done by the system at a given time.
Workload can include tasks such as running processes, handling network requests, and managing system resources.
Monitoring workload is important for ensuring system performance and stability.
Tools like top, htop, and sar can be used to track and analyze workload.
High workload can lead to system slowdowns or crashes.
Balancing workload across multiple servers can help improve overall system e...read more
Q73. What is contingency liability
Contingency liability is a potential liability that may occur in the future based on certain events or circumstances.
It is a liability that is not certain but may occur in the future
It is based on certain events or circumstances
Examples include lawsuits, warranties, and environmental cleanup costs
Q74. Difference between iics and power centre
IICS is a cloud-based data integration platform while Power Centre is an on-premise data integration tool.
IICS is a newer platform compared to Power Centre
IICS offers more advanced features such as AI and machine learning capabilities
Power Centre is more suitable for large-scale data integration projects
IICS is more flexible and scalable due to its cloud-based nature
Power Centre requires more hardware and infrastructure to run
Both platforms offer similar functionalities such ...read more
Q75. Swift advantages and disadvantages
Swift is a powerful and modern programming language for iOS development, but it has its own set of advantages and disadvantages.
Advantages: faster performance, safer code with optionals, easier to read and write code, interoperability with Objective-C
Disadvantages: steep learning curve for beginners, limited community support compared to other languages like Java or Python
Q76. Pattern drawing numbers in piramid
The pattern involves drawing numbers in a pyramid shape.
Start with 1 at the top of the pyramid
Each row below has one more number than the row above
Numbers increase sequentially from left to right in each row
Q77. What linux kernel
The Linux kernel is the core component of the Linux operating system, responsible for managing hardware resources and providing essential services.
The Linux kernel is open-source and developed by a community of developers worldwide.
It is released under the GNU General Public License (GPL).
The kernel version can be checked using the 'uname -r' command.
Examples of popular Linux kernel versions include 2.6, 3.x, 4.x, and 5.x.
Q78. Technical projects done in collage
I completed several technical projects in college, including a mobile app for tracking fitness goals and a website for a local business.
Developed a mobile app for tracking fitness goals using Java and Android Studio
Created a website for a local business using HTML, CSS, and JavaScript
Collaborated with classmates on a database project using SQL
Q79. What is secure agent
Secure Agent is a lightweight program that runs on-premises or in the cloud to securely connect to data sources.
Secure Agent is used in Informatica Cloud to securely connect to on-premises data sources
It is a lightweight program that can be installed on-premises or in the cloud
Secure Agent uses SSL/TLS encryption to secure data in transit
It can be configured to run on a schedule or triggered by an event
Examples of data sources that can be accessed using Secure Agent include d...read more
Q80. reverse a linked list
Reverse a linked list by changing the direction of pointers
Start with three pointers: current, previous, and next
Iterate through the linked list, updating pointers to reverse the direction
Update the head of the linked list to be the previous node
Q81. Explain electrical process
Electrical process involves the flow of electric current through a circuit to perform a specific task.
Electricity is generated at a power source, such as a battery or generator.
The electricity flows through conductive materials, such as wires, to reach the desired destination.
Components like resistors, capacitors, and switches can modify the flow of electricity.
The electrical energy is converted into other forms of energy, such as light in a bulb or motion in a motor.
Safety m...read more
Q82. Fiels service configuration process
Field service configuration process involves setting up and optimizing systems for efficient on-site service operations.
Define service requirements and objectives
Select appropriate field service management software
Configure software to match service needs
Integrate software with other systems for seamless operations
Train field service technicians on software usage
Monitor and adjust configurations as needed
Q83. Principles of accounting
Principles of accounting refer to the basic concepts and guidelines that govern the preparation and presentation of financial statements.
The principles of accounting include the accrual principle, the consistency principle, the materiality principle, and the conservatism principle.
Accrual principle states that revenue and expenses should be recognized when earned or incurred, regardless of when cash is received or paid.
Consistency principle requires that accounting methods an...read more
Q84. architecture of DBMS
DBMS architecture refers to the structure and components of a database management system.
DBMS architecture typically consists of three levels: external, conceptual, and internal.
External level deals with how users interact with the database, conceptual level defines the logical structure of the database, and internal level focuses on how data is stored and accessed.
Components of DBMS architecture include query processor, storage manager, transaction manager, and data dictiona...read more
Q85. Explain coding in c
Coding in C involves writing instructions in the C programming language to create software applications.
C is a high-level programming language known for its efficiency and flexibility.
C programs consist of functions, variables, loops, and conditional statements.
Example: Writing a simple 'Hello World' program in C: #include
int main() { printf("Hello, World!"); return 0; }
Q86. using useEffect
More about working at IBM
Top HR Questions asked in Shajay Fabricators & Engineers
Interview Process at Shajay Fabricators & Engineers
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month