Add office photos
Engaged Employer

IBM

4.0
based on 21.7k Reviews
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

80+ Shajay Fabricators & Engineers Interview Questions and Answers

Updated 14 Dec 2024
Popular Designations

Q1. Star Pattern Problem Statement

Display the star pattern for a given positive integer N.

Example:

Input:
N = 4
Output:
 *
***
*****
*******
Explanation:

The dots in the image represent spaces. Align the stars in...read more

Add your answer

Q2. How will respond when you are the only one available on weekend , whenever there are client pings or user pings

Ans.

I will prioritize urgent client or user pings and respond promptly to address their needs.

  • Prioritize urgent client or user pings over non-urgent ones

  • Respond promptly to address their needs

  • Communicate with the client or user to understand the issue and provide assistance

  • Document the issue and resolution for future reference

View 1 answer

Q3. Given string/sentence need to be reversed and the vowels need to be replaced with numbers from 1-9.In the reversed string replaced numbers should appear in descending order from left to right .If there are more...

read more
Ans.

Reverse a string and replace vowels with numbers in descending order. Restart numbering if more than 9 vowels.

  • Reverse the given string using built-in functions or loops

  • Create a dictionary to map vowels to numbers from 1-9

  • Iterate through the reversed string and replace vowels with numbers from the dictionary

  • If there are more than 9 vowels, restart numbering from 1

  • Sort the replaced numbers in descending order from left to right

View 1 answer

Q4. Design a system for railway ticket booking

Ans.

Design a system for railway ticket booking

  • Create a user-friendly interface for booking tickets

  • Integrate payment gateway for secure transactions

  • Implement seat availability and reservation system

  • Include features for cancellation and refund

  • Develop a database to store user and ticket information

View 2 more answers
Discover Shajay Fabricators & Engineers interview dos and don'ts from real experiences

Q5. How to compare 2 files(file handling)

Ans.

To compare 2 files in file handling, read both files line by line and compare each line.

  • Read both files line by line

  • Compare each line of the files

  • Handle cases where files have different number of lines

  • Use file handling functions like fopen, fgets, and fclose

Add your answer
Q6. How do you match the orientations according to the suggested rotation degrees?
Add your answer
Are these interview questions helpful?

Q7. Aws cloud services name a few

Ans.

AWS offers a wide range of cloud services for various purposes.

  • Compute services: EC2, Lambda

  • Storage services: S3, EBS

  • Database services: RDS, DynamoDB

  • Networking services: VPC, Route 53

  • Security services: IAM, KMS

  • Analytics services: Redshift, EMR

  • AI/ML services: SageMaker, Rekognition

View 1 answer

Q8. Aws cloud pillars name a few

Ans.

AWS cloud pillars are the foundation of AWS cloud computing services.

  • Security - ensuring data protection and privacy

  • Reliability - ensuring system availability and fault tolerance

  • Performance Efficiency - optimizing resource utilization and scalability

  • Cost Optimization - minimizing costs while maximizing benefits

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What is the DBMS and What is use of DBMS?

Ans.

DBMS stands for Database Management System. It is used to manage and organize data in a structured manner.

  • DBMS is a software system that allows users to define, create, maintain and control access to databases.

  • It provides a way to store and retrieve data efficiently and effectively.

  • DBMS helps in maintaining data integrity, security and consistency.

  • Examples of DBMS include MySQL, Oracle, SQL Server, MongoDB, etc.

Add your answer

Q10. Any questions?

Ans.

Yes, I have a few questions regarding the company culture and team dynamics.

  • Can you tell me more about the team structure and how collaboration is encouraged?

  • What is the company's approach to professional development and growth?

  • How does the company prioritize work-life balance for its employees?

View 1 answer

Q11. Replace a sub-string in a string.

Ans.

To replace a sub-string in a string, use the replace() method.

  • Use the replace() method with the old sub-string and new sub-string as arguments.

  • The replace() method only replaces the first occurrence of the sub-string by default.

  • To replace all occurrences, use a regular expression with the global flag.

  • Example: 'hello world'.replace('world', 'universe') returns 'hello universe'.

  • Example: 'hello world'.replace(/world/g, 'universe') returns 'hello universe'.

View 1 answer

Q12. Two Sum: given 2 numbers, check if there exists 2 numbers such that they sum to target

Ans.

Given an array of numbers, check if there exists two numbers that sum to a target number.

  • Use a hash set to store the complement of each number as you iterate through the array.

  • For each number, check if its complement exists in the hash set.

  • If the complement exists, return true. Otherwise, add the number to the hash set.

  • If no two numbers sum to the target, return false.

Add your answer

Q13. What is the MVC?Describe in brief.

Ans.

MVC stands for Model-View-Controller. It is a software design pattern used to separate an application's concerns.

  • Model represents the data and business logic

  • View displays the data to the user

  • Controller handles user input and updates the model and view accordingly

  • MVC promotes separation of concerns and modularity

  • Examples include Ruby on Rails, ASP.NET MVC, and Spring MVC

Add your answer

Q14. What is CRM? WHAT WORK FLOW?

Ans.

CRM stands for Customer Relationship Management. It is a software that helps businesses manage their interactions with customers.

  • CRM helps businesses organize customer data and interactions

  • It can track sales, marketing campaigns, and customer support

  • Examples of CRM software include Salesforce, HubSpot, and Zoho CRM

Add your answer

Q15. Write a program for highest odd number from 1 - 100 in java

Ans.

Program to find the highest odd number from 1-100 in Java

  • Loop through numbers 1-100

  • Check if the number is odd

  • If it is odd, check if it is greater than the current highest odd number

  • If it is, update the current highest odd number

  • Return the highest odd number

Add your answer

Q16. How to find badis, different between user exit and customer exit

Ans.

Badis can be found using transaction code SE18. User exits are older and customer exits are newer enhancements in SAP.

  • Badis can be found using transaction code SE18.

  • User exits are older enhancements in SAP.

  • Customer exits are newer enhancements in SAP.

  • Badis provide a more flexible and object-oriented approach compared to user exits and customer exits.

  • Badis can be implemented multiple times, while user exits and customer exits can only be implemented once.

  • Badis are implemented ...read more

View 1 answer

Q17. What do you know about DITA XML, which tags have you used in your documents, what are keywords, and what is DITA mapping, have you ever created graphics or illustrations, types of DITA topics, benefits of DITA,...

read more
Ans.

DITA XML is a structured content standard used for creating technical documentation.

  • DITA XML is a structured content standard for technical documentation

  • Commonly used tags include <topic>, <title>, <body>, <section>

  • Keywords are used to categorize content for easy retrieval

  • DITA mapping is the process of linking topics together in a hierarchy

  • Graphics and illustrations can be created and included in DITA documents

  • Types of DITA topics include concept, task, reference

  • Benefits of D...read more

Add your answer

Q18. What is Android development

Ans.

Android development is the process of creating applications for the Android operating system.

  • Android development involves writing code in Java or Kotlin to create mobile applications.

  • It includes designing user interfaces, implementing functionality, and testing the app.

  • Developers use Android Studio, an integrated development environment (IDE), for building Android apps.

  • Android apps can be published on the Google Play Store and run on various devices.

  • Examples of Android apps i...read more

View 6 more answers

Q19. What is use of activity creator

Ans.

The activity creator is used to create instances of an activity class in Android development.

  • The activity creator is responsible for instantiating an activity class.

  • It is typically used when starting a new activity from another activity.

  • The activity creator can pass data to the new activity through intent extras.

  • It is commonly used in the onCreate() method of the calling activity.

  • Example: Intent intent = new Intent(this, SecondActivity.class); startActivity(intent);

View 2 more answers

Q20. Write a program for finding postion of 'r' in program

Ans.

Program to find position of 'r' in a given string

  • Use a loop to iterate through each character in the string

  • Check if the current character is 'r'

  • If it is, return the index of that character

  • If 'r' is not found, return -1

Add your answer

Q21. Difference between session method and call transaction

Ans.

Session method and call transaction are two different ways of executing SAP transactions.

  • Session method executes a transaction in the same session as the calling program.

  • Call transaction executes a transaction in a separate session.

  • Session method is faster and more efficient as it does not require opening a new session.

  • Call transaction is useful when the transaction being executed has its own set of screens and requires user input.

  • Session method is used when the transaction b...read more

Add your answer

Q22. What is design thinking, have you ever communicated with developers, what do you do when you do not have enough information but the deadline is already near?

Ans.

Design thinking is a problem-solving approach that focuses on understanding the user's needs and creating innovative solutions.

  • Design thinking involves empathizing with users, defining the problem, ideating solutions, prototyping, and testing.

  • Yes, I have communicated with developers to understand technical aspects and constraints of the project.

  • When lacking information near a deadline, I prioritize the most critical aspects, communicate with stakeholders for clarification, an...read more

Add your answer

Q23. How do you receive input, what are DDLC and SDLC, what style guides have you used for creating documents, how do you ensure accuracy in your document.

Ans.

I receive input through meetings and emails, DDLC is Document Development Life Cycle, SDLC is Software Development Life Cycle, I use APA and Chicago style guides, I ensure accuracy through thorough research and review.

  • Receive input through meetings with subject matter experts and stakeholders

  • DDLC (Document Development Life Cycle) is the process of creating, editing, and publishing documents

  • SDLC (Software Development Life Cycle) is the process of developing software from plann...read more

Add your answer

Q24. RFC how to trigger an RFC

Ans.

To trigger an RFC, use the function module 'RFC_FUNCTION_CALL'.

  • Provide the RFC name and input parameters in the 'RFC_FUNCTION_CALL' function module.

  • Use the 'DESTINATION' parameter to specify the target system.

  • Call the function module using 'CALL FUNCTION'.

Add your answer

Q25. How to enhance standard table

Ans.

To enhance a standard table in SAP ABAP, use append structures or custom fields.

  • Create an append structure to add fields to the standard table without modifying it directly.

  • Use custom fields to add new fields to the table.

  • Enhance the table using the Enhancement Framework.

  • Use BAdIs (Business Add-Ins) to add custom logic to the standard table.

  • Examples: Append structure for MARA table to add custom fields for material master data.

  • Custom fields added to VBAK table for sales order...read more

Add your answer

Q26. what is lan, network provider, speak on any topic for 5 min

Ans.

LAN is a local area network that connects devices within a limited area. Network providers offer internet services to customers.

  • LAN is a computer network that covers a small geographic area, such as a home, office, or building.

  • It allows devices to communicate with each other and share resources like printers and files.

  • Network providers offer internet services to customers, such as cable, DSL, or fiber optic connections.

  • They provide the infrastructure and technology necessary ...read more

Add your answer

Q27. What do you know of Agile Methodology and Scrum?

Ans.

Agile Methodology and Scrum are popular project management frameworks used in software development.

  • Agile Methodology is a flexible approach to software development that emphasizes incremental delivery, collaboration, and continuous improvement.

  • Scrum is a specific Agile framework that divides work into sprints, with daily stand-up meetings and regular reviews.

  • Scrum roles include Product Owner, Scrum Master, and Development Team.

  • Scrum artifacts include Product Backlog, Sprint B...read more

Add your answer

Q28. Have you worked with any version control systems?

Ans.

Yes, I have experience working with version control systems.

  • I have used Git for version control in my previous roles.

  • I am familiar with branching, merging, and resolving conflicts in Git.

  • I have also worked with SVN (Subversion) in the past.

Add your answer

Q29. Implicit and explicit enhancement

Ans.

Implicit and explicit enhancements in SAP ABAP

  • Implicit enhancements are modifications made to standard SAP code without changing the original code

  • Explicit enhancements are modifications made to standard SAP code by adding new code to the original code

  • Implicit enhancements are done using function modules, while explicit enhancements are done using enhancement points

  • Implicit enhancements are not visible in the standard SAP code, while explicit enhancements are visible in the st...read more

Add your answer

Q30. Explain features of Android development

Ans.

Android development features include open-source platform, rich development environment, and extensive libraries.

  • Open-source platform allows for customization and flexibility

  • Rich development environment with tools like Android Studio

  • Extensive libraries for various functionalities like UI, networking, and database

  • Support for multiple hardware devices and screen sizes

  • Integration with Google services like Maps, Firebase, and Play Store

  • Ability to create interactive and engaging u...read more

View 1 answer

Q31. What is java

Ans.

Java is a high-level programming language used for developing a wide range of applications, including Android apps.

  • Java is an object-oriented language.

  • It is platform-independent, meaning it can run on any operating system.

  • Java uses a virtual machine called the Java Virtual Machine (JVM) to execute code.

  • It has a large standard library with built-in classes and methods for common programming tasks.

  • Java is known for its simplicity, readability, and robustness.

View 2 more answers

Q32. What is meant by accounts payable?

Ans.

Accounts payable refers to the amount of money a company owes to its suppliers or vendors for goods or services received.

  • Accounts payable is a liability on the balance sheet.

  • It represents the company's short-term obligations to pay for goods or services.

  • It includes invoices, bills, and other payment obligations.

  • Accounts payable is typically recorded when goods or services are received, but payment has not yet been made.

  • Examples of accounts payable include utility bills, inven...read more

View 3 more answers

Q33. What is abstract class

Ans.

An abstract class is a class that cannot be instantiated and is used as a base class for other classes.

  • An abstract class can have abstract methods that must be implemented by its subclasses.

  • Abstract classes can have non-abstract methods and properties.

  • An abstract class can be used to define a common interface for a group of related classes.

  • Example: 'Animal' can be an abstract class with abstract methods like 'eat' and 'move', which must be implemented by its subclasses like '...read more

Add your answer

Q34. Multiple inheritance in oo abap

Ans.

Multiple inheritance allows a class to inherit from multiple superclasses in OO ABAP.

  • Multiple inheritance can be achieved using interfaces.

  • A class can implement multiple interfaces.

  • A class can inherit from one superclass and implement multiple interfaces.

  • Example: Class ZCL_MYCLASS extends ZCL_SUPERCLASS implements ZIF_INTERFACE1, ZIF_INTERFACE2.

  • Diamond problem can occur in multiple inheritance.

  • To avoid diamond problem, use interface inheritance instead of class inheritance.

Add your answer

Q35. What are the golden rules

Ans.

The golden rules of accounting are basic principles that guide the recording of financial transactions.

  • The first golden rule is the rule of debit and credit.

  • The second golden rule is the rule of assets and liabilities.

  • The third golden rule is the rule of income and expenses.

  • These rules ensure accuracy and consistency in financial reporting.

  • For example, if a company purchases inventory on credit, the rule of debit and credit dictates that the inventory account is debited and t...read more

View 5 more answers

Q36. What kind of techniques that applies in industry ?

Add your answer

Q37. List out all the steps that are needed to be followed in order to switch Chrome settings to default.

Ans.

To switch Chrome settings to default, follow these steps.

  • Open Chrome settings

  • Scroll down and click on 'Advanced'

  • Scroll down further and click on 'Reset settings'

  • Confirm the reset by clicking on 'Reset' button

Add your answer

Q38. What is asynchronous And synchronous

Ans.

Asynchronous and synchronous are programming concepts that determine how tasks are executed.

  • Synchronous tasks are executed one after the other, in a sequential manner.

  • Asynchronous tasks can be executed simultaneously, without waiting for the previous task to complete.

  • Synchronous tasks are easier to understand and debug, while asynchronous tasks are more efficient and can improve performance.

  • Examples of synchronous tasks include reading a file or waiting for user input, while ...read more

Add your answer

Q39. What is interface

Ans.

An interface is a contract between two systems or components that defines the methods and parameters that they will use to communicate with each other.

  • Interfaces allow for loose coupling between systems or components

  • They define a set of rules for communication

  • Interfaces can be used in programming languages like Java and C#

  • Examples of interfaces include JDBC for database connectivity and SOAP for web services

Add your answer

Q40. Field symbol in ABAP

Ans.

Field symbol is a pointer to a field in ABAP.

  • Field symbol is used to access data dynamically.

  • It can be used to avoid copying large amounts of data.

  • It can be used to access data in internal tables and structures.

  • Example: ASSIGN statement assigns a field symbol to a field.

  • Example: LOOP AT statement uses a field symbol to access data in internal tables.

Add your answer

Q41. What is the Java code for comparing two strings for equality?

Ans.

Use the equals() method in Java to compare two strings for equality.

  • Use the equals() method to compare two strings for equality.

  • Example: String str1 = "hello"; String str2 = "hello"; if(str1.equals(str2)) { // strings are equal }

Add your answer

Q42. What is 3 golden rules of accounting

Ans.

The 3 golden rules of accounting are: 1. Debit the receiver, credit the giver. 2. Debit what comes in, credit what goes out. 3. Debit expenses and losses, credit income and gains.

  • Rule 1: Debit the receiver, credit the giver. This means that when an asset is received, it is debited, and when a liability is given, it is credited.

  • Rule 2: Debit what comes in, credit what goes out. This means that when there is an inflow of assets, it is debited, and when there is an outflow of as...read more

Add your answer

Q43. Explain how will you handle a client who is facing performance issue on BPM

Ans.

I will analyze the issue, identify the root cause, and provide a solution to improve performance.

  • Gather information about the issue and the client's environment

  • Analyze the data to identify the root cause of the performance issue

  • Provide recommendations to improve performance, such as optimizing processes or increasing resources

  • Work with the client to implement the solution and monitor the results

  • Provide ongoing support and maintenance to ensure continued performance improvemen...read more

Add your answer

Q44. What is depreciation and it's types

Ans.

Depreciation is the decrease in value of an asset over time due to wear and tear, obsolescence or other factors.

  • Depreciation is a non-cash expense that reduces the value of an asset on the balance sheet

  • There are three types of depreciation: straight-line, accelerated, and units of production

  • Straight-line depreciation is when the asset loses an equal amount of value each year

  • Accelerated depreciation is when the asset loses more value in the early years and less in the later ye...read more

View 1 answer

Q45. How will u reverse a binary tree(not BST)?

Ans.

To reverse a binary tree, swap the left and right subtrees recursively starting from the root node.

  • Start by swapping the left and right subtrees of the root node

  • Recursively swap the left and right subtrees of each node

  • Stop when you reach the leaf nodes

  • Example: 1 1 / \ / \ 2 3 3 2

  • Example: A A / \ / \ B C C B / \ / \ / \ / \ D E F G G F E

Add your answer

Q46. Singleton pattern in oo ABAP

Ans.

Singleton pattern is a design pattern that restricts the instantiation of a class to one object.

  • Singleton pattern ensures that only one instance of a class is created and provides a global point of access to it.

  • It is useful when exactly one object is needed to coordinate actions across the system.

  • In ABAP, singleton pattern can be implemented using static attributes and methods.

  • Example: class CL_SING_ABAP implementing singleton pattern.

  • Ensure thread safety by using locks or at...read more

Add your answer

Q47. what are hyperparameters in random forest

Ans.

Hyperparameters in random forest are parameters that are set before the learning process begins.

  • Hyperparameters control the behavior of the random forest algorithm.

  • They are set by the data scientist and are not learned from the data.

  • Examples of hyperparameters in random forest include the number of trees, the maximum depth of trees, and the number of features considered at each split.

Add your answer

Q48. what the purpose of Grep and how to setup S3 on AIX

Ans.

Grep is a command-line utility for searching text files for specific patterns. S3 on AIX is a cloud storage service.

  • Grep is used to search for specific patterns in text files

  • S3 on AIX can be set up using the AWS CLI or SDK

  • Configure the AWS CLI with access keys and region information

  • Create an S3 bucket using the AWS CLI or SDK

  • Upload files to the S3 bucket using the AWS CLI or SDK

Add your answer

Q49. How many type of LV should we have on Enterprise Env

Ans.

There should be two types of LV on Enterprise Env - root LV and data LV.

  • Root LV is used for booting the system and should be small in size.

  • Data LV is used for storing data and should be larger in size.

  • Having separate LVs for root and data helps in better management and maintenance of the system.

  • Other types of LVs can be added based on specific requirements of the enterprise environment.

Add your answer

Q50. Write a one line code to find if a given number is a power of 2

Ans.

Check if a number is a power of 2 in one line of code.

  • Use bitwise AND operator to check if the number is greater than 0 and has only one bit set to 1.

  • If the number is a power of 2, it will have only one bit set to 1 in its binary representation.

  • Example: (n & (n-1)) == 0 will return true if n is a power of 2.

Add your answer

Q51. Tell me about a time you had to do a data analysis

Ans.

I analyzed customer feedback data to identify areas of improvement for a software product.

  • Collected customer feedback data through surveys and online reviews

  • Used Excel to organize and analyze the data

  • Identified common themes and issues mentioned by customers

  • Presented findings to the product development team for action

  • Implemented changes based on the analysis to improve customer satisfaction

Add your answer

Q52. How does a floating point number is stored ?

Ans.

Floating point numbers are stored using a combination of a sign bit, an exponent, and a mantissa.

  • A floating point number is represented in binary form.

  • The first bit represents the sign of the number (0 for positive, 1 for negative).

  • The next few bits represent the exponent, which determines the scale of the number.

  • The remaining bits represent the mantissa, which contains the significant digits of the number.

  • The IEEE 754 standard is commonly used for floating point representati...read more

Add your answer

Q53. What is in internet browse?

Ans.

An internet browser is a software application used to access and view websites on the internet.

  • An internet browser allows users to navigate the internet by entering website addresses or using search engines.

  • It displays web pages in a graphical user interface and allows users to interact with the content.

  • Popular internet browsers include Google Chrome, Mozilla Firefox, Microsoft Edge, and Safari.

  • Internet browsers also have features such as bookmarks, history, and extensions to...read more

Add your answer

Q54. What is BRS and it uses

Ans.

BRS stands for Business Requirement Specification. It is a document that outlines the requirements for a project or product.

  • BRS is used to clearly define the scope and objectives of a project or product

  • It helps to ensure that all stakeholders have a common understanding of the requirements

  • BRS can be used as a reference throughout the project to ensure that it stays on track

  • Examples of information included in a BRS are functional requirements, non-functional requirements, and ...read more

Add your answer

Q55. How will u generate PID of a process ?

Ans.

PID of a process can be generated using various commands in different operating systems.

  • In Linux, use the 'ps' command to get the process ID

  • In Windows, use the 'tasklist' command to get the process ID

  • In macOS, use the 'top' command to get the process ID

  • In Python, use the 'os.getpid()' function to get the process ID

Add your answer

Q56. Golden rule and explain each and give examples each

Ans.

The golden rule is a moral principle that states one should treat others as one would like others to treat oneself.

  • Golden rule: Treat others as you would like to be treated.

  • Explanation: This principle encourages empathy and kindness towards others.

  • Example: If you want people to be honest with you, you should also be honest with them.

  • Golden rule: Do not do to others what you would not want done to you.

  • Explanation: This principle emphasizes avoiding harm or hurt to others.

  • Examp...read more

Add your answer

Q57. How many programming languages do you know?

Ans.

I am proficient in three programming languages: Java, Python, and C++.

  • Proficient in Java, Python, and C++

  • Experience in developing applications using Java

  • Familiarity with Python libraries such as NumPy and Pandas

  • Knowledge of C++ programming concepts such as pointers and templates

Add your answer

Q58. how to perform lifecyle mehthods in functional components

Add your answer

Q59. What is working capital and formula

Ans.

Working capital is the difference between current assets and current liabilities, representing a company's ability to meet short-term obligations.

  • Working capital = Current Assets - Current Liabilities

  • It measures a company's liquidity and operational efficiency

  • Positive working capital indicates a company can cover its short-term liabilities

  • Negative working capital may indicate financial trouble or inefficiency

  • Examples: Cash, accounts receivable, inventory are current assets. A...read more

Add your answer

Q60. What is Goods requisition

Ans.

Goods requisition is the process of requesting and obtaining necessary items or materials for a particular purpose.

  • It involves identifying the required goods or materials

  • It involves submitting a request for the goods or materials

  • It involves obtaining the goods or materials once the request is approved

  • Examples include requisition of office supplies, equipment, or raw materials for production

Add your answer

Q61. Modify Dijkstra algorithm to find 3 Shortest path

Ans.

Modify Dijkstra algorithm to find 3 shortest paths

  • Implement a modified version of Dijkstra's algorithm that keeps track of the 3 shortest paths

  • Use a priority queue to store the nodes and their distances from the source node

  • When a node is visited, update the distances of its neighbors and add them to the priority queue

  • Keep track of the 3 shortest paths using an array or a list

  • Terminate the algorithm when the 3 shortest paths have been found or when the priority queue is empty

Add your answer

Q62. What is Risk modules?

Ans.

Risk modules are components or sections within a risk management system that focus on specific areas of risk assessment and mitigation.

  • Risk modules help in identifying, analyzing, and managing risks in different domains.

  • Examples of risk modules include credit risk module, market risk module, operational risk module, etc.

  • Each module is designed to address specific types of risks and may have its own set of tools, methodologies, and models.

  • Risk modules provide a structured appr...read more

Add your answer

Q63. how to do QnA system with LLM

Ans.

A QnA system with LLM is a system that uses the Language Model for Information Retrieval and Question Answering.

  • Preprocess the input question and convert it into a format suitable for the LLM model.

  • Fine-tune the LLM model on a dataset of question-answer pairs.

  • Use the fine-tuned model to generate answers for new questions.

  • Evaluate the performance of the QnA system using metrics like precision, recall, and F1 score.

  • Iteratively improve the system by refining the training data an...read more

Add your answer

Q64. Sort array in 0(n) time complexity

Ans.

Use counting sort algorithm to achieve O(n) time complexity.

  • Count the frequency of each string in the array.

  • Create a new array based on the frequency counts.

  • Iterate through the new array to reconstruct the sorted array.

Add your answer

Q65. What are the network topologies?

Ans.

Network topologies refer to the arrangement of various elements in a network.

  • There are several types of network topologies, including bus, star, ring, mesh, and hybrid.

  • Bus topology involves connecting all devices to a single cable.

  • Star topology involves connecting all devices to a central hub or switch.

  • Ring topology involves connecting devices in a circular manner.

  • Mesh topology involves connecting devices to each other in a network.

  • Hybrid topology is a combination of two or m...read more

Add your answer

Q66. How many types I receive payment

Ans.

There are multiple types of payment methods that can be received.

  • Cash

  • Credit card

  • Debit card

  • Online payment

  • Bank transfer

Add your answer

Q67. what is database, system design

Ans.

A database is a structured collection of data, while system design involves creating a plan for how different components of a system will work together.

  • Database is used to store and organize data in a structured manner.

  • System design involves creating a plan for how different components of a system will interact and work together efficiently.

  • Examples of databases include MySQL, PostgreSQL, and MongoDB.

  • Examples of system design considerations include scalability, reliability, a...read more

Add your answer

Q68. how to do unit testing

Ans.

Unit testing is a process of testing individual units of code to ensure they function correctly.

  • Write test cases for each unit of code

  • Test inputs, outputs, and edge cases

  • Use testing frameworks like JUnit or pytest

  • Automate tests to run regularly

  • Ensure tests are independent, isolated, and repeatable

Add your answer

Q69. how to instalation new server?

Ans.

To install a new server, follow these steps:

  • Choose the appropriate hardware and operating system

  • Configure network settings

  • Install necessary software packages

  • Set up security measures

  • Configure backups and monitoring

  • Test the server to ensure it is functioning properly

Add your answer

Q70. What is accrual and it's entry

Ans.

Accrual is an accounting method where revenue or expenses are recognized when earned or incurred, regardless of when payment is received or made.

  • Accrual accounting is the opposite of cash accounting

  • Accruals are recorded as adjusting entries in the general ledger

  • Examples of accruals include interest expense, salaries payable, and accounts receivable

  • The entry for an accrual involves debiting an expense account and crediting a liability account

Add your answer

Q71. What is cursor and its types

Ans.

A cursor is a database object used to manipulate data in a result set.

  • A cursor is used to retrieve data from a database one row at a time.

  • There are two types of cursors: implicit and explicit.

  • Implicit cursors are used for single-row queries, while explicit cursors are used for multi-row queries.

  • Examples of explicit cursors include FOR LOOP and OPEN-FOR-FETCH-CLOSE.

  • Cursors can be used to update, delete, or insert data into a database.

Add your answer

Q72. What is workload in linux

Ans.

Workload in Linux refers to the amount of work being done by the system at a given time.

  • Workload can include tasks such as running processes, handling network requests, and managing system resources.

  • Monitoring workload is important for ensuring system performance and stability.

  • Tools like top, htop, and sar can be used to track and analyze workload.

  • High workload can lead to system slowdowns or crashes.

  • Balancing workload across multiple servers can help improve overall system e...read more

Add your answer

Q73. What is contingency liability

Ans.

Contingency liability is a potential liability that may occur in the future based on certain events or circumstances.

  • It is a liability that is not certain but may occur in the future

  • It is based on certain events or circumstances

  • Examples include lawsuits, warranties, and environmental cleanup costs

Add your answer

Q74. Difference between iics and power centre

Ans.

IICS is a cloud-based data integration platform while Power Centre is an on-premise data integration tool.

  • IICS is a newer platform compared to Power Centre

  • IICS offers more advanced features such as AI and machine learning capabilities

  • Power Centre is more suitable for large-scale data integration projects

  • IICS is more flexible and scalable due to its cloud-based nature

  • Power Centre requires more hardware and infrastructure to run

  • Both platforms offer similar functionalities such ...read more

Add your answer

Q75. Swift advantages and disadvantages

Ans.

Swift is a powerful and modern programming language for iOS development, but it has its own set of advantages and disadvantages.

  • Advantages: faster performance, safer code with optionals, easier to read and write code, interoperability with Objective-C

  • Disadvantages: steep learning curve for beginners, limited community support compared to other languages like Java or Python

Add your answer

Q76. Pattern drawing numbers in piramid

Ans.

The pattern involves drawing numbers in a pyramid shape.

  • Start with 1 at the top of the pyramid

  • Each row below has one more number than the row above

  • Numbers increase sequentially from left to right in each row

Add your answer

Q77. What linux kernel

Ans.

The Linux kernel is the core component of the Linux operating system, responsible for managing hardware resources and providing essential services.

  • The Linux kernel is open-source and developed by a community of developers worldwide.

  • It is released under the GNU General Public License (GPL).

  • The kernel version can be checked using the 'uname -r' command.

  • Examples of popular Linux kernel versions include 2.6, 3.x, 4.x, and 5.x.

Add your answer

Q78. Technical projects done in collage

Ans.

I completed several technical projects in college, including a mobile app for tracking fitness goals and a website for a local business.

  • Developed a mobile app for tracking fitness goals using Java and Android Studio

  • Created a website for a local business using HTML, CSS, and JavaScript

  • Collaborated with classmates on a database project using SQL

Add your answer

Q79. What is secure agent

Ans.

Secure Agent is a lightweight program that runs on-premises or in the cloud to securely connect to data sources.

  • Secure Agent is used in Informatica Cloud to securely connect to on-premises data sources

  • It is a lightweight program that can be installed on-premises or in the cloud

  • Secure Agent uses SSL/TLS encryption to secure data in transit

  • It can be configured to run on a schedule or triggered by an event

  • Examples of data sources that can be accessed using Secure Agent include d...read more

Add your answer

Q80. reverse a linked list

Ans.

Reverse a linked list by changing the direction of pointers

  • Start with three pointers: current, previous, and next

  • Iterate through the linked list, updating pointers to reverse the direction

  • Update the head of the linked list to be the previous node

Add your answer

Q81. Explain electrical process

Ans.

Electrical process involves the flow of electric current through a circuit to perform a specific task.

  • Electricity is generated at a power source, such as a battery or generator.

  • The electricity flows through conductive materials, such as wires, to reach the desired destination.

  • Components like resistors, capacitors, and switches can modify the flow of electricity.

  • The electrical energy is converted into other forms of energy, such as light in a bulb or motion in a motor.

  • Safety m...read more

Add your answer

Q82. Fiels service configuration process

Ans.

Field service configuration process involves setting up and optimizing systems for efficient on-site service operations.

  • Define service requirements and objectives

  • Select appropriate field service management software

  • Configure software to match service needs

  • Integrate software with other systems for seamless operations

  • Train field service technicians on software usage

  • Monitor and adjust configurations as needed

Add your answer

Q83. Principles of accounting

Ans.

Principles of accounting refer to the basic concepts and guidelines that govern the preparation and presentation of financial statements.

  • The principles of accounting include the accrual principle, the consistency principle, the materiality principle, and the conservatism principle.

  • Accrual principle states that revenue and expenses should be recognized when earned or incurred, regardless of when cash is received or paid.

  • Consistency principle requires that accounting methods an...read more

Add your answer

Q84. architecture of DBMS

Ans.

DBMS architecture refers to the structure and components of a database management system.

  • DBMS architecture typically consists of three levels: external, conceptual, and internal.

  • External level deals with how users interact with the database, conceptual level defines the logical structure of the database, and internal level focuses on how data is stored and accessed.

  • Components of DBMS architecture include query processor, storage manager, transaction manager, and data dictiona...read more

Add your answer

Q85. Explain coding in c

Ans.

Coding in C involves writing instructions in the C programming language to create software applications.

  • C is a high-level programming language known for its efficiency and flexibility.

  • C programs consist of functions, variables, loops, and conditional statements.

  • Example: Writing a simple 'Hello World' program in C: #include int main() { printf("Hello, World!"); return 0; }

Add your answer

Q86. using useEffect

Add your answer

More about working at IBM

Top Rated Mega Company - 2024
Top Rated Company for Women - 2024
Top Rated IT/ITES Company - 2024
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Shajay Fabricators & Engineers

based on 117 interviews
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.7
 • 6.3k Interview Questions
3.4
 • 648 Interview Questions
3.9
 • 484 Interview Questions
3.6
 • 335 Interview Questions
4.0
 • 245 Interview Questions
3.4
 • 174 Interview Questions
View all
Top IBM Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter