IBM
1000+ Sri Sairam Institute of Technology Interview Questions and Answers
Given an array/list of integer numbers 'CHOCOLATES' of size 'N', where each value of the array/list represents the number of chocolates in the packet. There are ‘M’ number of students and the t...read more
Print the following pattern
Pattern for N = 4
The dots represent spaces.
Input Format :
N (Total no. of rows)
Output Format :
Pattern in N lines
Constraints :
0 <= N <= 50
Q3. 1. Abstraction vs Inheritance 2. What is Garbage collector? 3. What is class loader? 4. Spring security 5. Scopes of bean 6. Wait , notify and notify all 7. Class level vs object level local 8. Arraylist vs Lin...
read moreJava interview questions covering topics like abstraction, inheritance, garbage collector, class loader, Spring security, bean scopes, wait-notify, class vs object level local, ArrayList vs LinkedList, Singleton class, and RestController vs Controller.
Abstraction focuses on hiding implementation details while inheritance allows a class to inherit properties and methods from another class.
Garbage collector is a program that automatically frees up memory by deleting objects tha...read more
Q4. Given string/sentence need to be reversed and the vowels need to be replaced with numbers from 1-9.In the reversed string replaced numbers should appear in descending order from left to right .If there are more...
read moreReverse a string and replace vowels with numbers in descending order. Restart numbering if more than 9 vowels.
Reverse the given string using built-in functions or loops
Create a dictionary to map vowels to numbers from 1-9
Iterate through the reversed string and replace vowels with numbers from the dictionary
If there are more than 9 vowels, restart numbering from 1
Sort the replaced numbers in descending order from left to right
Q5. what is comp & comp 3 differance ?
COMP and COMP-3 are data types used in COBOL programming language.
COMP is a binary data type that stores numeric values as binary integers.
COMP-3 is a packed decimal data type that stores numeric values as packed decimal digits.
COMP uses less storage space compared to COMP-3.
COMP-3 is more suitable for decimal arithmetic operations.
COMP-3 values are stored in a packed format, where each digit occupies half a byte.
COMP-3 values can represent both positive and negative numbers.
Q6. How to check that all port are connected to your computers and power supply or system configuration ?
To check all connected ports and power supply, use commands like lsusb, lspci, lshw, and check power cables and system configuration.
Use lsusb command to list USB devices connected to the computer
Use lspci command to list PCI devices connected to the computer
Use lshw command to list detailed hardware information
Physically check power cables and connections
Verify system configuration settings
If I leave you in a room along with 4 people of software engineers and I give you time to formulate any idea or a project, what will it be?
What projects you have worked on?
This question included a large problem including the basics and condition of a business problem in my case related to various taxes, and I had to form a solution to get the final output.There ...read more
Q9. we have 2 files eliminate duplicates and send to duplicate files in to another out put file how to achieve it ?
To eliminate duplicates from 2 files and send them to another output file, we can use a combination of file reading, hashing, and file writing.
Read the contents of both files and store them in separate arrays or lists.
Create a hash table or dictionary to keep track of the unique elements in the arrays.
Iterate through the arrays and add each element to the hash table. If the element already exists, skip it.
Write the contents of the hash table to the output file.
If needed, writ...read more
Q10. Tell me how to write ansible playbooks and how would you define a CI/CD pipeline. What tools can you use for pipeline creation and how it works.
Ansible playbooks automate configuration management. CI/CD pipeline automates software delivery. Tools include Jenkins, GitLab, and Travis CI.
Ansible playbooks are written in YAML format and define tasks to be executed on remote hosts.
CI/CD pipeline automates the software delivery process from code commit to production deployment.
Tools for pipeline creation include Jenkins, GitLab, Travis CI, and CircleCI.
Pipeline creation involves defining stages, jobs, and triggers to autom...read more
Q11. What are the detail that you will share to the supplier for getting a quote.?
The details to share with the supplier for a quote
Product specifications
Quantity required
Delivery timeline
Quality standards
Payment terms
Any specific packaging or labeling requirements
Any applicable certifications or regulatory compliance
Expected pricing or budget constraints
Q12. What do you know about Ariba, how ariba is different from other Procurement Tools.?
Ariba is a procurement tool that offers a comprehensive suite of solutions for procurement processes.
Ariba provides end-to-end procurement solutions, including sourcing, contract management, supplier management, and procurement analytics.
It offers a cloud-based platform that allows for easy collaboration between buyers and suppliers.
Ariba's network connects millions of buyers and suppliers globally, enabling efficient procurement processes.
The tool provides real-time visibili...read more
Q13. What is inheritance and what are their types? Explain them.
Inheritance is a mechanism in object-oriented programming where a new class is derived from an existing class.
It allows the new class to inherit the properties and methods of the existing class.
There are two types of inheritance: single and multiple.
Single inheritance is when a class inherits from only one parent class.
Multiple inheritance is when a class inherits from multiple parent classes.
For example, a class 'Car' can inherit from a parent class 'Vehicle' which has prope...read more
Q14. What do you know about DITA XML, which tags have you used in your documents, what are keywords, and what is DITA mapping, have you ever created graphics or illustrations, types of DITA topics, benefits of DITA,...
read moreDITA XML is a structured content standard used for creating technical documentation.
DITA XML is a structured content standard for technical documentation
Commonly used tags include
, , ,Keywords are used to categorize content for easy retrieval
DITA mapping is the process of linking topics together in a hierarchy
Graphics and illustrations can be created and included in DITA documents
Types of DITA topics include concept, task, reference
Benefits of D...read more
Q15. How to manage clients, how to handle critical issues with example
Managing clients and handling critical issues
Establish clear communication channels with clients
Set realistic expectations and manage client's expectations
Proactively identify and address potential issues
Provide timely updates and resolutions
Maintain a positive and professional attitude
Document and learn from critical issues for future improvement
Q16. Stages of AML, types of alerts in transaction monitoring, sanctions
The stages of AML include customer identification, transaction monitoring, and reporting. Types of alerts in transaction monitoring include high-risk transactions, unusual activity, and potential money laundering. Sanctions refer to restrictions imposed on individuals or entities by governments or international organizations.
Stages of AML: customer identification, transaction monitoring, reporting
Types of alerts in transaction monitoring: high-risk transactions, unusual activ...read more
Questions on Speed time and distance were asked the most
Logical questions
Verbal question were just passage based question and answers
In DBMS most questions were from normalization
OOPs Inheritance i...read more
Q18. 1) How to handle data skewness in spark.
Data skewness in Spark can be handled by partitioning, bucketing, or using salting techniques.
Partitioning the data based on a key column can distribute the data evenly across the nodes.
Bucketing can group the data into buckets based on a key column, which can improve join performance.
Salting involves adding a random prefix to the key column, which can distribute the data evenly.
Using broadcast joins for small tables can also help in reducing skewness.
Using dynamic allocation...read more
Q19. 1.How would you implement a distributed system that can handle a large number of requests?
A distributed system can handle a large number of requests by dividing the workload among multiple nodes.
Use load balancing techniques to distribute requests evenly across nodes.
Implement fault tolerance mechanisms to ensure system availability.
Use message queues or event-driven architectures to handle asynchronous processing.
Consider using caching mechanisms to improve performance.
Implement horizontal scaling by adding more nodes to the system.
Use distributed databases or da...read more
Q20. how to check file is empty or not ?
To check if a file is empty or not, we can use the file's size or read the file and check for any content.
Get the size of the file using file system APIs and check if it is zero.
Read the file and check if it contains any content.
Handle exceptions or errors that may occur during file operations.
Q21. how you handle non functional requirements ? how you do capacity planning ?
Non-functional requirements are handled by considering various factors and capacity planning is done by analyzing current and future needs.
Identify and prioritize non-functional requirements
Analyze the impact of non-functional requirements on the system
Design and implement solutions to meet non-functional requirements
Perform capacity planning by considering current and future needs
Monitor system performance and make adjustments as necessary
Q22. Wat are the causes of a blue screen error
A blue screen error can be caused by various factors such as hardware issues, driver conflicts, and software errors.
Hardware issues like faulty RAM or overheating can cause blue screen errors.
Driver conflicts occur when incompatible or outdated drivers are installed.
Software errors, such as corrupted system files or incompatible applications, can also lead to blue screen errors.
Q23. How to check data set & mount point information in human readable format ?
To check data set & mount point info in human readable format, use the 'df' command.
Open the terminal and type 'df -h' to display the information in human-readable format.
The 'df' command shows the file system disk space usage, including the mount point and file system type.
The '-h' option displays the sizes in a human-readable format, such as 'K' for kilobytes, 'M' for megabytes, and 'G' for gigabytes.
You can also use the 'mount' command to display the mounted file systems a...read more
Q24. How do you identify network error and methods to rectify them
To identify network errors, monitor network performance, analyze logs, use network troubleshooting tools, and rectify them by troubleshooting hardware, software, or configuration issues.
Monitor network performance to identify any anomalies or issues
Analyze network logs for error messages or patterns
Use network troubleshooting tools like ping, traceroute, or network analyzers
Troubleshoot hardware issues such as faulty cables, switches, or routers
Troubleshoot software issues li...read more
Q25. Wat do you understand about TAT and how is it useful
TAT stands for Turnaround Time. It refers to the time taken to complete a process or task.
TAT is a measure of efficiency and productivity.
It helps in setting realistic expectations and deadlines.
TAT is crucial in customer service to ensure timely delivery of products or services.
For example, in IT operations, TAT can be used to measure the time taken to resolve technical issues.
TAT can also be used to track the time taken to process and approve operational requests.
Q26. How recover a user file deleted or file /etc/passwd ?
To recover a deleted user file or /etc/passwd, restore from backup or use data recovery tools.
Check if a backup of the file exists and restore it
If no backup is available, use data recovery tools like extundelete or scalpel
Stop writing to the disk immediately to prevent overwriting the deleted file
Consult with a professional if necessary
Q27. how to check if the server of Facebook is up without opening the browser or app.
Use command line tools like ping or curl to check server status.
Use ping command to check if server is reachable
Use curl command to check if server is responding with HTTP status code 200
Use telnet command to check if server is listening on a specific port
Use monitoring tools like Nagios or Zabbix to automate server status checks
Q28. How to check a user password status for any users ?
To check a user password status, use the 'passwd' command with the '-S' option followed by the username.
Open the terminal or command prompt.
Type 'passwd -S
' and press Enter. The password status will be displayed, indicating if the password is locked, expired, or active.
Q29. How to find badis, different between user exit and customer exit
Badis can be found using transaction code SE18. User exits are older and customer exits are newer enhancements in SAP.
Badis can be found using transaction code SE18.
User exits are older enhancements in SAP.
Customer exits are newer enhancements in SAP.
Badis provide a more flexible and object-oriented approach compared to user exits and customer exits.
Badis can be implemented multiple times, while user exits and customer exits can only be implemented once.
Badis are implemented ...read more
Q30. What is debit, credit, inventory, debit note credit note suspense account ect..
Debit and credit are accounting terms used to record financial transactions. Inventory is the stock of goods a company has on hand.
Debit is an entry on the left side of an account, while credit is an entry on the right side of an account.
Inventory is the stock of goods a company has on hand and is recorded as an asset on the balance sheet.
A debit note is a document used to inform a vendor of a debit made to their account.
A credit note is a document used to inform a vendor of ...read more
Q31. What are different modernizations you did on Mainframes ?
Modernizations on Mainframes include migration to cloud, adoption of DevOps practices, and integration with modern technologies.
Migration of mainframe applications to cloud platforms like AWS or Azure
Adoption of DevOps practices for continuous integration and delivery
Integration of mainframe systems with modern technologies like APIs and microservices
Replacement of legacy mainframe applications with modern web or mobile applications
Implementation of modern security measures a...read more
Q32. how many ways data pass jcl to cobol program ?
Data can pass from JCL to COBOL program in multiple ways, such as through input files, system symbols, and program parameters.
Input files: Data can be passed to a COBOL program through input files specified in the JCL.
System symbols: JCL can define system symbols that can be accessed by the COBOL program to retrieve data.
Program parameters: JCL can pass parameters to the COBOL program, which can be used to receive data.
Environment variables: JCL can set environment variables ...read more
Q33. How is Warehouse Order created ? What is the logic behind the creation of Warehouse Order when there are 10 warehouse tasks ?
Warehouse Orders are created based on the logic of prioritizing tasks and optimizing efficiency.
Warehouse Orders are created to manage the movement and storage of goods in a warehouse.
The creation of Warehouse Orders involves prioritizing tasks based on factors like urgency, location, and resource availability.
The logic behind creating Warehouse Orders is to optimize efficiency by grouping similar tasks together and minimizing travel time.
For example, if there are 10 warehous...read more
Q34. Is it true that statistical models and Machine Learning are the same ?
No, statistical models and Machine Learning are not the same.
Statistical models are based on mathematical equations and assumptions, while Machine Learning uses algorithms to learn patterns from data.
Statistical models require a priori knowledge of the data distribution, while Machine Learning can handle complex and unstructured data.
Statistical models are often used for hypothesis testing and parameter estimation, while Machine Learning is used for prediction and classificat...read more
Q35. What are polymorphism, abstraction, and encapsulation?
Polymorphism, abstraction, and encapsulation are three fundamental concepts in object-oriented programming.
Polymorphism allows objects of different classes to be treated as if they are objects of the same class.
Abstraction is the process of hiding complex implementation details and showing only the necessary information to the user.
Encapsulation is the practice of keeping the internal workings of an object hidden from the outside world.
Examples of polymorphism include method ...read more
Q36. What architectural principles / methodologies you know ?
Architectural principles and methodologies are fundamental concepts that guide the design and development of software systems.
Service-Oriented Architecture (SOA)
Microservices Architecture
Event-Driven Architecture (EDA)
Domain-Driven Design (DDD)
Layered Architecture
Component-Based Architecture
Model-View-Controller (MVC)
RESTful Architecture
Big Data Architecture
Cloud Computing Architecture
Q37. What if, you are unable to find a supplier for the materials that you require.?
If unable to find a supplier, explore alternative sources, negotiate with existing suppliers, or consider changing specifications.
Explore alternative sources such as online marketplaces or international suppliers
Negotiate with existing suppliers to see if they can provide the required materials or suggest alternative options
Consider changing specifications to align with available suppliers or materials
Collaborate with other departments or companies to pool resources and find ...read more
Q38. Explain how containers, docker and Kubernetes work with each other ? How do you connect to a container from public internet?
Q39. How we can check groups lists & assinged users to them ?
To check group lists and assigned users, we can use the 'getent' command in Linux and Unix systems.
Use the 'getent group' command to list all the groups and their details
To check the users assigned to a specific group, use 'getent group
' The output will display the group name, group ID, and a list of users assigned to the group
Q40. What is design thinking, have you ever communicated with developers, what do you do when you do not have enough information but the deadline is already near?
Design thinking is a problem-solving approach that focuses on understanding the user's needs and creating innovative solutions.
Design thinking involves empathizing with users, defining the problem, ideating solutions, prototyping, and testing.
Yes, I have communicated with developers to understand technical aspects and constraints of the project.
When lacking information near a deadline, I prioritize the most critical aspects, communicate with stakeholders for clarification, an...read more
Q41. What is use one as many, copy value function , format by example
These are three different functions in SAP PI/PO used for mapping and transforming data.
Use One As Many: Splits one source field into multiple target fields
Copy Value Function: Copies the value of one field to another field
Format by Example: Formats the target field based on the example provided
Q42. Design a system for railway ticket booking
Design a system for railway ticket booking
Create a user-friendly interface for booking tickets
Integrate payment gateway for secure transactions
Implement seat availability and reservation system
Include features for cancellation and refund
Develop a database to store user and ticket information
Q43. Introduction what do you mean SAP mm what is purchase order what is sub contracting vendor what moment type use in sub contracting, what is physical inventory
SAP MM is a module that deals with material management. Purchase order is a document used to procure goods or services. Subcontracting vendor is a vendor who provides goods or services to a company. Movement types are used in sub-contracting to track the movement of goods. Physical inventory is a process of counting and verifying the inventory on hand.
SAP MM deals with material management
Purchase order is a document used to procure goods or services
Subcontracting vendor is a ...read more
Q44. What you will do if you got to know there is a performance issue in code change which you developed before 1 day of production deployment
I would immediately investigate the issue and work to resolve it before the production deployment.
Check the logs to identify the root cause of the performance issue
Analyze the code changes made and identify any potential bottlenecks
Work with the development team to implement a fix for the issue
Perform thorough testing to ensure the fix does not introduce any new issues
Communicate the issue and resolution to stakeholders and management
Q45. how can we create a mirror pool & what does it require for ?
A mirror pool is a storage configuration that duplicates data across multiple drives for redundancy and improved performance.
A mirror pool is created using software RAID (Redundant Array of Independent Disks) technology.
It requires at least two drives to create a mirror pool.
The data written to one drive is automatically duplicated to the other drive in real-time.
If one drive fails, the data can still be accessed from the remaining drive.
Creating a mirror pool provides data r...read more
Q46. 5) How to create a kafka topic with replication factor 2
To create a Kafka topic with replication factor 2, use the command line tool or Kafka API.
Use the command line tool 'kafka-topics.sh' with the '--replication-factor' flag set to 2.
Alternatively, use the Kafka API to create a topic with a replication factor of 2.
Ensure that the number of brokers in the Kafka cluster is greater than or equal to the replication factor.
Consider setting the 'min.insync.replicas' configuration property to 2 to ensure that at least two replicas are ...read more
Q47. how to get distinct data without using distinct keyword
To get distinct data without using distinct keyword, use GROUP BY clause.
Use GROUP BY clause with the column name to group the data by that column.
Use aggregate functions like COUNT, SUM, AVG, etc. to get the desired result.
Example: SELECT column_name FROM table_name GROUP BY column_name;
Example: SELECT column_name, COUNT(*) FROM table_name GROUP BY column_name;
Q48. What is Android development
Android development is the process of creating applications for the Android operating system.
Android development involves writing code in Java or Kotlin to create mobile applications.
It includes designing user interfaces, implementing functionality, and testing the app.
Developers use Android Studio, an integrated development environment (IDE), for building Android apps.
Android apps can be published on the Google Play Store and run on various devices.
Examples of Android apps i...read more
Q49. What ac will be debited and credited at the time of discounting?
The account to be debited and credited at the time of discounting depends on the specific transaction and the parties involved.
In general, the account to be debited is the Discount Allowed account, which represents the expense incurred by the seller for providing the discount.
The account to be credited is typically the Accounts Receivable account, which represents the amount owed by the buyer for the discounted goods or services.
However, the specific accounts may vary dependi...read more
Q50. Write a program for highest odd number from 1 - 100 in java
Program to find the highest odd number from 1-100 in Java
Loop through numbers 1-100
Check if the number is odd
If it is odd, check if it is greater than the current highest odd number
If it is, update the current highest odd number
Return the highest odd number
Q51. how to data insert or update in table ?
To insert or update data in a table, use SQL statements like INSERT INTO or UPDATE.
For inserting data, use the INSERT INTO statement followed by the table name and column names.
Specify the values to be inserted using the VALUES keyword.
For updating data, use the UPDATE statement followed by the table name.
Set the column values to be updated using the SET keyword.
Use conditions with the WHERE clause to specify which rows to update.
Q52. How do you receive input, what are DDLC and SDLC, what style guides have you used for creating documents, how do you ensure accuracy in your document.
I receive input through meetings and emails, DDLC is Document Development Life Cycle, SDLC is Software Development Life Cycle, I use APA and Chicago style guides, I ensure accuracy through thorough research and review.
Receive input through meetings with subject matter experts and stakeholders
DDLC (Document Development Life Cycle) is the process of creating, editing, and publishing documents
SDLC (Software Development Life Cycle) is the process of developing software from plann...read more
Q53. How we can check all information destroy pool & get back them ?
To check all information destroy pool & get back them, we can use ZFS snapshots and clones.
ZFS snapshots and clones can be used to recover data from a destroyed pool.
Snapshots capture the state of the pool at a specific point in time.
Clones can be created from snapshots and mounted as a separate file system.
Data can be copied from the clone to the new pool.
It is important to regularly create snapshots to ensure data can be recovered in case of a disaster.
Q54. What is use of activity creator
The activity creator is used to create instances of an activity class in Android development.
The activity creator is responsible for instantiating an activity class.
It is typically used when starting a new activity from another activity.
The activity creator can pass data to the new activity through intent extras.
It is commonly used in the onCreate() method of the calling activity.
Example: Intent intent = new Intent(this, SecondActivity.class); startActivity(intent);
Q55. Can you tell me what is a difference between front end developer and backend developer
Front end developers focus on the user interface and user experience, while backend developers handle the server-side logic and database management.
Front end developers work on the client-side of web development, creating the visual elements and interactions that users see and interact with.
They use languages like HTML, CSS, and JavaScript to build responsive and user-friendly websites.
Backend developers work on the server-side of web development, handling the behind-the-scen...read more
Q56. what is array ? how to load data ?
An array is a data structure that stores a collection of elements of the same type.
Arrays can be used to store and access multiple values using a single variable.
To load data into an array of strings, you can assign values to each element individually or use a loop.
Example: String[] names = {"John", "Jane", "Mike"};
Example: for(int i = 0; i < names.length; i++) { names[i] = "Value" + i; }
Q57. Your total experience is 6+ in SQL and SSIS, but your relevant experience in Datastage is 3+, and already you are on a higher package as compared with 3 years Datastage developer, we might tak a pause here as y...
read moreMy experience in SQL and SSIS has prepared me well for Datastage development. I am confident in my ability to quickly learn and excel in this role.
My experience in SQL and SSIS has given me a strong foundation in data integration and ETL processes.
I have already demonstrated my ability to learn quickly and adapt to new technologies, as evidenced by my success in my current role.
I am eager to expand my skillset and take on new challenges in Datastage development.
I am open to d...read more
Q58. How to know that in which directory we are sitting presently ?
To know the current directory in Linux/Unix, use the 'pwd' command.
Type 'pwd' in the terminal and press enter.
The output will show the full path of the current directory.
Alternatively, you can use 'echo $PWD' to display the current directory path.
The command 'ls' can also be used to list the contents of the current directory.
Q59. How can we attach &detach disk from a normal and mirror pool ?
To attach & detach disk from normal and mirror pool, use zpool attach and zpool detach commands.
To attach a disk to a normal pool, use 'zpool attach poolname existing_device new_device'
To detach a disk from a normal pool, use 'zpool detach poolname device'
To attach a disk to a mirror pool, use 'zpool attach poolname existing_device mirror_device'
To detach a disk from a mirror pool, use 'zpool detach poolname mirror_device'
Q60. What are the different types of AWS services used for handling Big Data in AWS. What are the storage services used ? What are the equivalents available in Azure?
Q61. 1. Difference between, IBP S&OP Demand and IBP Demand. 2. What are the forecast models available in IBP S&OP Demand. 3. How to configure Product life cycle in S&OP Demand. 4. What is difference between IBP Supp...
read moreQ62. What were the challenges faced while do application migration on hybrid cloud? How to mitigate those things for successful delivery?
Challenges in application migration on hybrid cloud and ways to mitigate them
Challenges include data security, network latency, and compatibility issues
Mitigation strategies include using encryption, optimizing network connectivity, and testing for compatibility
Proper planning and communication with stakeholders is crucial for successful delivery
Q63. In C# --> Abstraction, Interface , Abstract Method, Abstract Class, Polymorphisms, Encapsulation ,Inheritance, Serialization,
C# concepts including abstraction, interface, abstract method, abstract class, polymorphism, encapsulation, inheritance, and serialization.
Abstraction: hiding implementation details
Interface: defining a contract for behavior
Abstract method: method without implementation
Abstract class: class with one or more abstract methods
Polymorphism: ability of objects to take on multiple forms
Encapsulation: bundling data and behavior together
Inheritance: creating new classes from existing...read more
Q64. What is your knowledge on devops tools. Explain me the most challenging use case that you have done.
I have knowledge on various devops tools and have worked on challenging use cases such as implementing continuous integration and deployment pipelines using Jenkins and Docker.
Proficient in using Jenkins, Docker, Git, Ansible, and Kubernetes
Implemented CI/CD pipelines for multiple projects
Automated deployment process using Ansible and Kubernetes
Implemented containerization using Docker and Kubernetes
Implemented infrastructure as code using Terraform
Challenging use case: Setti...read more
Q65. What is TCS. What is TAN. What is e way challan. What is SLA. What is one time vendor.
TCS is Tax Collected at Source. TAN is Tax Deduction and Collection Account Number. E-way challan is an electronic waybill for transportation of goods. SLA is Service Level Agreement. One time vendor is a vendor who is used only once for a specific transaction.
TCS is a tax collected by the seller from the buyer at the time of sale.
TAN is a 10-digit alphanumeric number used as an identification number for persons deducting or collecting tax at source.
E-way challan is a documen...read more
Q66. What are performance enhancement practices you followed while a System got hanged or intermittent freezing?
To enhance performance during system hang or intermittent freezing, we follow these practices:
Analyze system logs to identify the root cause of the issue
Check system resources like CPU, memory, disk usage, etc.
Optimize database performance by tuning parameters and indexes
Implement SAP recommended notes and patches
Monitor system performance regularly to identify potential issues
Implement load balancing and clustering to distribute workload
Use SAP tools like ST12, ST13, ST14, e...read more
Q67. From Java 1. What is class and object? 2. Describe OOPS concept 3. Details from Exception Handling Some basic questions ask from DBMS
Questions related to Java and DBMS concepts
Class is a blueprint for creating objects, while object is an instance of a class
OOPS concepts include encapsulation, inheritance, polymorphism, and abstraction
Exception handling is a mechanism to handle runtime errors and prevent program crashes
DBMS questions may include SQL queries, normalization, and database design
Q68. What do you understand about DevOps and how do you achieve it in public cloud ? What services and settings are to be done in AWS or Azure for creating the CICD pipeline?
Q69. What is your company's code review process? What practices you follow while writing code. How do you test your code manually?
Our code review process involves peer reviews and automated testing. We follow best practices and use manual testing for edge cases.
Peer reviews are conducted for all code changes before merging into the main branch
We use automated testing tools like Jest and Enzyme for unit and integration testing
We follow best practices like writing clean and modular code, using meaningful variable names, and commenting where necessary
Manual testing is used for edge cases and scenarios that...read more
Q70. What is the difference between CDD and EDD
CDD is basic due diligence while EDD is enhanced due diligence.
CDD is a standard process of verifying the identity of a customer and assessing the risk associated with them.
EDD is a more thorough process that involves gathering additional information about the customer to mitigate higher risks.
CDD is typically used for low-risk customers while EDD is used for high-risk customers.
Examples of EDD include conducting background checks, reviewing financial statements, and obtainin...read more
Q71. List the activities an architect should perform to handle the disaster recovery of the application and the database. How do you handle it with minimum RTO and RPO?
Q72. What we are considered profit or loss how to create in your point of you
Profit or loss is created by comparing revenue and expenses.
Profit is created when revenue exceeds expenses.
Loss is created when expenses exceed revenue.
Net income is calculated by subtracting expenses from revenue.
Profit and loss statement shows the financial performance of a company.
Profitability ratios like gross profit margin and net profit margin are used to analyze profit or loss.
Accrual accounting recognizes revenue and expenses when they are earned or incurred, while ...read more
Q73. Management types in snow and in how many days can join
The question is unclear and requires clarification.
The question needs to be rephrased for better understanding.
It is unclear what is meant by 'management types in snow'.
The number of days it takes to join is also unclear.
Further clarification is needed to provide an accurate answer.
Q74. What is structuring or round dollar , or what is three type money laundering … what is threshold … country based questions they can ask
Q75. How will you check if a pod in ReplicaSet went down or failed and what was the reason for the same?
To check if a pod in ReplicaSet went down or failed, monitor the pod status, logs, and events.
Monitor the pod status using kubectl get pods command
Check the pod logs for any error messages using kubectl logs command
Review the events related to the pod using kubectl describe pod command
Set up alerts or notifications for pod failures using monitoring tools like Prometheus or Grafana
Q76. Describe the entire POC Process you followed while migrating your SAP On-Premise System to the Google Cloud Platform. ( Technical Specs and Errors Encountered). Observations regarding the Sizing and Output.
Outlined POC process for migrating SAP On-Premise System to Google Cloud Platform
Analyzed current system and determined necessary resources for migration
Created a test environment to ensure compatibility and identify errors
Used Cloud Migration for SAP tool to migrate data and configurations
Encountered errors with network connectivity and resolved through troubleshooting
Monitored system performance and made necessary adjustments for optimal output
Q77. Big data Hadoop architecture and HDFS commands to copy and list files in hdfs spark architecture and Transformation and Action question what happen when we submit spark program spark dataframe coding question s...
read moreQuestions on big data, Hadoop, Spark, Scala, Git, project and Agile.
Hadoop architecture and HDFS commands for copying and listing files in HDFS
Spark architecture and Transformation and Action question
What happens when we submit a Spark program
Spark DataFrame coding question
Scala basic program on List
Git and Github
Project-related question
Agile-related
Q78. Which programming language are you familiar with ? Do you know R ?
Yes, I am familiar with R.
I have experience in data analysis and visualization using R.
I have used R for statistical modeling and machine learning.
I am comfortable with R packages such as ggplot2, dplyr, and tidyr.
Q79. Difference between SOAP & REST, remove and collapse context, file and sftp?
SOAP is a protocol for exchanging structured information, while REST is an architectural style for building web services.
SOAP uses XML to encode messages, while REST uses a variety of formats such as JSON, XML, or plain text.
SOAP is more rigid and requires more bandwidth, while REST is more flexible and lightweight.
Remove context is used to remove the context of a message, while collapse context is used to collapse the context of a message.
File is used to transfer files betwe...read more
Q80. What is the difference between Index and subscript?
Index and subscript are used to access elements in an array or list, but index refers to the position while subscript refers to the value.
Index is the position of an element in an array or list, starting from 0.
Subscript is the value used to access an element in an array or list.
For example, in the array [1, 2, 3], the index of 2 is 1 and the subscript of 2 is 2.
Index is an integer while subscript can be any data type that can be used as an index.
Index is used in programming ...read more
Q81. what you should see in the show interface type/member/module/number?
The show interface command displays the status and statistics of a network interface.
Displays the interface type, member, module, and number
Shows the current status of the interface (up or down)
Displays the number of packets transmitted and received
Shows the number of errors and discards
Displays the speed and duplex settings of the interface
Q82. How to you prepare EMI and balance sheet end of the month or year reporting how to prepare
To prepare EMI and balance sheet end of the month or year reporting, follow these steps:
Ensure all transactions are recorded accurately and completely
Reconcile bank statements and other accounts
Prepare adjusting entries for accruals and deferrals
Organize accounts into appropriate categories for the balance sheet
Calculate EMI based on loan amount, interest rate, and term
Verify accuracy of all calculations
Prepare financial statements and reports
Review and analyze financial data...read more
Match the orientations according to the rotation degrees suggested
Q84. Name any four situations where we have to create a Bank Reconciliation Statement.
Four situations where we have to create a Bank Reconciliation Statement
When there is a discrepancy between the bank balance and the company's books
When there are outstanding checks or deposits in transit
When there are bank errors or fees that need to be reconciled
When there are adjustments for interest earned or bank charges
Q85. What is the advantage of SLT Replication compared to other replication Methods?
SLT Replication offers real-time data replication with minimal system impact.
SLT Replication allows for real-time data replication from multiple sources to a single target system.
It offers minimal system impact as it uses trigger-based replication instead of full table scans.
SLT Replication also provides data transformation capabilities and supports heterogeneous data replication.
Compared to other replication methods, SLT Replication is more efficient and cost-effective.
For e...read more
Q86. What's the ad value of bgp and bgp States?
BGP (Border Gateway Protocol) is a routing protocol used in internet networks. It provides scalability, redundancy, and policy control.
BGP is used to exchange routing information between different autonomous systems (AS)
It allows for efficient routing decisions based on policies and network conditions
BGP states represent the different stages of establishing and maintaining BGP peering sessions
Examples of BGP states include Idle, Connect, Active, OpenSent, OpenConfirm, Establi...read more
Q87. How we scan a LUN & check the wwn number ?
To scan a LUN and check the wwn number, use the 'multipath' command.
Run 'multipath -ll' to list all the available LUNs and their wwn numbers.
To scan for new LUNs, run 'echo '- - -' > /sys/class/scsi_host/hostX/scan' (replace X with the appropriate host number).
Use 'multipath -v3' for verbose output and troubleshooting.
Ensure that the necessary drivers and modules are loaded for the storage device.
Check the system logs for any errors or warnings related to the LUN or storage d...read more
Q88. How do you calculate the cost implications when proposing an architecture? What are the steps involved in migrating an existing application to Cloud?
Q89. What is Data Structure? why we use Data Structure?what is Array?Difference between array and variable. Difference between array and Data structure.
Data structure is a way of organizing and storing data in a computer so that it can be accessed and used efficiently.
Data structure is used to manage and manipulate data effectively.
Array is a type of data structure that stores a fixed-size sequential collection of elements of the same type.
Variables are used to store a single value, while arrays can store multiple values of the same type.
Data structure is a broader term that includes arrays and other types of structures like...read more
Q90. What are modules in Terraform, share your screen and write module
Modules in Terraform are reusable components that allow you to encapsulate and organize your infrastructure code.
Modules help in breaking down complex infrastructure into smaller, manageable components
They promote reusability and maintainability of code
Modules can be shared and used across different projects
Example: Creating a module for provisioning a virtual machine in Azure
Q91. How would you provide security to your credentials while using Terraform
Use encrypted variables, limit access to credentials, and utilize secure storage solutions.
Encrypt sensitive variables using tools like Vault or AWS KMS
Limit access to credentials by using least privilege principles
Store credentials securely in a password manager or key vault
Avoid hardcoding credentials in Terraform configuration files
Q92. If you are using CICD define your stages and issues you faced
CICD stages include build, test, deploy, and monitor. Common issues include integration challenges and pipeline failures.
Stages: Build, Test, Deploy, Monitor
Issues: Integration challenges, Pipeline failures
Example: Integration challenges with third-party tools delaying deployment
Q93. Will you be able to work if given any type of work like either DevOps or only Cloud or only Development?
Yes, I am capable of working in various roles such as DevOps, Cloud, and Development.
I have experience and skills in DevOps practices such as automation, CI/CD, and infrastructure as code.
I am proficient in cloud technologies like AWS, Azure, or Google Cloud Platform.
I have a strong background in software development with expertise in languages like Python, Java, or JavaScript.
Q94. How to secure our system security user mangement ?
To secure system security user management, follow best practices such as strong passwords, regular audits, limited privileges, and multi-factor authentication.
Enforce strong password policies
Regularly audit user accounts and access permissions
Implement least privilege principle
Enable multi-factor authentication
Disable unnecessary user accounts
Regularly update and patch the system
Implement intrusion detection and prevention systems
Encrypt sensitive data
Monitor system logs for ...read more
Q95. What are the programming languages on which I have knowledge regarding.
I have knowledge in multiple programming languages.
Java
Python
C++
JavaScript
Q96. What are the types of clouds?
There are three types of clouds: public, private, and hybrid.
Public clouds are owned and operated by third-party providers, and the infrastructure is shared among multiple organizations.
Private clouds are dedicated to a single organization and can be located on-premises or hosted by a third-party provider.
Hybrid clouds combine public and private clouds, allowing organizations to take advantage of the benefits of both.
Examples of public clouds include Amazon Web Services (AWS)...read more
Q97. Statement vs prepared statements(whats the use of pstmts over stmts), why microservice when the same can happen in monolithic(Not normal differences expected something else), how Rest API will work (internal pr...
read morePrepared statements are precompiled SQL statements that can improve performance and security. Microservices offer scalability and flexibility over monolithic architecture. REST API works by using HTTP methods to interact with resources.
Prepared statements are precompiled SQL statements that can be reused multiple times, improving performance by reducing database load and preventing SQL injection attacks.
Microservices allow for independent deployment, scalability, and flexibil...read more
Q98. Technical Round: Different types of wait with differences between explicit and fluent wait
Explicit and fluent wait are types of wait used in test automation to handle synchronization issues.
Explicit wait is used to wait for a specific condition to occur before proceeding further in the test script.
Fluent wait is used to wait for a condition with a defined polling frequency and timeout duration.
Explicit wait provides more control and flexibility as it allows specifying the condition and the maximum wait time.
Fluent wait provides a more fluent and readable way of wa...read more
Q99. From which scenario we can identify that HANA Database has an issue which is caused by Memory?
HANA Database memory issue identification scenario
High memory consumption by HANA processes
Frequent garbage collection
Slow query performance
Out of memory errors in HANA logs
Memory-related alerts in HANA monitoring tools
Q100. 4) How to read json data using spark
To read JSON data using Spark, use the SparkSession.read.json() method.
Create a SparkSession object
Use the read.json() method to read the JSON data
Specify the path to the JSON file or directory containing JSON files
The resulting DataFrame can be manipulated using Spark's DataFrame API
More about working at IBM
Top HR Questions asked in Sri Sairam Institute of Technology
Interview Process at Sri Sairam Institute of Technology
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month