Add office photos
Engaged Employer

IBM

4.1
based on 21.3k Reviews
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

1000+ Thermo Systems India Interview Questions and Answers

Updated 13 Jan 2025
Popular Designations
Q1. Chocolate Problem

Given an array/list of integer numbers 'CHOCOLATES' of size 'N', where each value of the array/list represents the number of chocolates in the packet. There are ‘M’ number of students and the t...read more

View 3 more answers
Q2. Star Pattern

Pattern for N = 4


The dots represent spaces.



Input Format :
N (Total no. of rows) 
Output Format :
Pattern in N lines 
Constraints :
0 <= N <= 50 
Add your answer

Q3. 1. Abstraction vs Inheritance 2. What is Garbage collector? 3. What is class loader? 4. Spring security 5. Scopes of bean 6. Wait , notify and notify all 7. Class level vs object level local 8. Arraylist vs Lin...

read more
Ans.

Java interview questions covering topics like abstraction, inheritance, garbage collector, class loader, Spring security, bean scopes, wait-notify, class vs object level local, ArrayList vs LinkedList, Singleton class, and RestController vs Controller.

  • Abstraction focuses on hiding implementation details while inheritance allows a class to inherit properties and methods from another class.

  • Garbage collector is a program that automatically frees up memory by deleting objects tha...read more

Add your answer

Q4. Given string/sentence need to be reversed and the vowels need to be replaced with numbers from 1-9.In the reversed string replaced numbers should appear in descending order from left to right .If there are more...

read more
Ans.

Reverse a string and replace vowels with numbers in descending order. Restart numbering if more than 9 vowels.

  • Reverse the given string using built-in functions or loops

  • Create a dictionary to map vowels to numbers from 1-9

  • Iterate through the reversed string and replace vowels with numbers from the dictionary

  • If there are more than 9 vowels, restart numbering from 1

  • Sort the replaced numbers in descending order from left to right

View 1 answer
Discover Thermo Systems India interview dos and don'ts from real experiences

Q5. what is comp &amp; comp 3 differance ?

Ans.

COMP and COMP-3 are data types used in COBOL programming language.

  • COMP is a binary data type that stores numeric values as binary integers.

  • COMP-3 is a packed decimal data type that stores numeric values as packed decimal digits.

  • COMP uses less storage space compared to COMP-3.

  • COMP-3 is more suitable for decimal arithmetic operations.

  • COMP-3 values are stored in a packed format, where each digit occupies half a byte.

  • COMP-3 values can represent both positive and negative numbers.

View 12 more answers

Q6. How to check that all port are connected to your computers and power supply or system configuration ?

Ans.

To check all connected ports and power supply, use commands like lsusb, lspci, lshw, and check power cables and system configuration.

  • Use lsusb command to list USB devices connected to the computer

  • Use lspci command to list PCI devices connected to the computer

  • Use lshw command to list detailed hardware information

  • Physically check power cables and connections

  • Verify system configuration settings

View 1 answer
Are these interview questions helpful?
Q7. Technical Questions

If I leave you in a room along with 4 people of software engineers and I give you time to formulate any idea or a project, what will it be?

What projects you have worked on?

Add your answer
Q8. Business and taxes

This question included a large problem including the basics and condition of a business problem in my case related to various taxes, and I had to form a solution to get the final output.There ...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. we have 2 files eliminate duplicates and send to duplicate files in to another out put file how to achieve it ?

Ans.

To eliminate duplicates from 2 files and send them to another output file, we can use a combination of file reading, hashing, and file writing.

  • Read the contents of both files and store them in separate arrays or lists.

  • Create a hash table or dictionary to keep track of the unique elements in the arrays.

  • Iterate through the arrays and add each element to the hash table. If the element already exists, skip it.

  • Write the contents of the hash table to the output file.

  • If needed, writ...read more

View 4 more answers

Q10. Tell me how to write ansible playbooks and how would you define a CI/CD pipeline. What tools can you use for pipeline creation and how it works.

Ans.

Ansible playbooks automate configuration management. CI/CD pipeline automates software delivery. Tools include Jenkins, GitLab, and Travis CI.

  • Ansible playbooks are written in YAML format and define tasks to be executed on remote hosts.

  • CI/CD pipeline automates the software delivery process from code commit to production deployment.

  • Tools for pipeline creation include Jenkins, GitLab, Travis CI, and CircleCI.

  • Pipeline creation involves defining stages, jobs, and triggers to autom...read more

View 2 more answers

Q11. What are the detail that you will share to the supplier for getting a quote.?

Ans.

The details to share with the supplier for a quote

  • Product specifications

  • Quantity required

  • Delivery timeline

  • Quality standards

  • Payment terms

  • Any specific packaging or labeling requirements

  • Any applicable certifications or regulatory compliance

  • Expected pricing or budget constraints

View 1 answer

Q12. What do you know about Ariba, how ariba is different from other Procurement Tools.?

Ans.

Ariba is a procurement tool that offers a comprehensive suite of solutions for procurement processes.

  • Ariba provides end-to-end procurement solutions, including sourcing, contract management, supplier management, and procurement analytics.

  • It offers a cloud-based platform that allows for easy collaboration between buyers and suppliers.

  • Ariba's network connects millions of buyers and suppliers globally, enabling efficient procurement processes.

  • The tool provides real-time visibili...read more

View 1 answer

Q13. What is inheritance and what are their types? Explain them.

Ans.

Inheritance is a mechanism in object-oriented programming where a new class is derived from an existing class.

  • It allows the new class to inherit the properties and methods of the existing class.

  • There are two types of inheritance: single and multiple.

  • Single inheritance is when a class inherits from only one parent class.

  • Multiple inheritance is when a class inherits from multiple parent classes.

  • For example, a class 'Car' can inherit from a parent class 'Vehicle' which has prope...read more

View 1 answer

Q14. How to manage clients, how to handle critical issues with example

Ans.

Managing clients and handling critical issues

  • Establish clear communication channels with clients

  • Set realistic expectations and manage client's expectations

  • Proactively identify and address potential issues

  • Provide timely updates and resolutions

  • Maintain a positive and professional attitude

  • Document and learn from critical issues for future improvement

View 2 more answers

Q15. What do you know about DITA XML, which tags have you used in your documents, what are keywords, and what is DITA mapping, have you ever created graphics or illustrations, types of DITA topics, benefits of DITA,...

read more
Ans.

DITA XML is a structured content standard used for creating technical documentation.

  • DITA XML is a structured content standard for technical documentation

  • Commonly used tags include <topic>, <title>, <body>, <section>

  • Keywords are used to categorize content for easy retrieval

  • DITA mapping is the process of linking topics together in a hierarchy

  • Graphics and illustrations can be created and included in DITA documents

  • Types of DITA topics include concept, task, reference

  • Benefits of D...read more

Add your answer

Q16. Stages of AML, types of alerts in transaction monitoring, sanctions

Ans.

The stages of AML include customer identification, transaction monitoring, and reporting. Types of alerts in transaction monitoring include high-risk transactions, unusual activity, and potential money laundering. Sanctions refer to restrictions imposed on individuals or entities by governments or international organizations.

  • Stages of AML: customer identification, transaction monitoring, reporting

  • Types of alerts in transaction monitoring: high-risk transactions, unusual activ...read more

View 5 more answers
Q17. MCQ Questions

Questions on Speed time and distance were asked the most
Logical questions
Verbal question were just passage based question and answers
In DBMS most questions were from normalization
OOPs Inheritance i...read more

Add your answer

Q18. 1) How to handle data skewness in spark.

Ans.

Data skewness in Spark can be handled by partitioning, bucketing, or using salting techniques.

  • Partitioning the data based on a key column can distribute the data evenly across the nodes.

  • Bucketing can group the data into buckets based on a key column, which can improve join performance.

  • Salting involves adding a random prefix to the key column, which can distribute the data evenly.

  • Using broadcast joins for small tables can also help in reducing skewness.

  • Using dynamic allocation...read more

View 4 more answers

Q19. 1.How would you implement a distributed system that can handle a large number of requests?

Ans.

A distributed system can handle a large number of requests by dividing the workload among multiple nodes.

  • Use load balancing techniques to distribute requests evenly across nodes.

  • Implement fault tolerance mechanisms to ensure system availability.

  • Use message queues or event-driven architectures to handle asynchronous processing.

  • Consider using caching mechanisms to improve performance.

  • Implement horizontal scaling by adding more nodes to the system.

  • Use distributed databases or da...read more

View 1 answer

Q20. how to check file is empty or not ?

Ans.

To check if a file is empty or not, we can use the file's size or read the file and check for any content.

  • Get the size of the file using file system APIs and check if it is zero.

  • Read the file and check if it contains any content.

  • Handle exceptions or errors that may occur during file operations.

View 2 more answers

Q21. how you handle non functional requirements ? how you do capacity planning ?

Ans.

Non-functional requirements are handled by considering various factors and capacity planning is done by analyzing current and future needs.

  • Identify and prioritize non-functional requirements

  • Analyze the impact of non-functional requirements on the system

  • Design and implement solutions to meet non-functional requirements

  • Perform capacity planning by considering current and future needs

  • Monitor system performance and make adjustments as necessary

View 1 answer

Q22. Wat are the causes of a blue screen error

Ans.

A blue screen error can be caused by various factors such as hardware issues, driver conflicts, and software errors.

  • Hardware issues like faulty RAM or overheating can cause blue screen errors.

  • Driver conflicts occur when incompatible or outdated drivers are installed.

  • Software errors, such as corrupted system files or incompatible applications, can also lead to blue screen errors.

View 10 more answers

Q23. How to check data set &amp; mount point information in human readable format ?

Ans.

To check data set & mount point info in human readable format, use the 'df' command.

  • Open the terminal and type 'df -h' to display the information in human-readable format.

  • The 'df' command shows the file system disk space usage, including the mount point and file system type.

  • The '-h' option displays the sizes in a human-readable format, such as 'K' for kilobytes, 'M' for megabytes, and 'G' for gigabytes.

  • You can also use the 'mount' command to display the mounted file systems a...read more

Add your answer

Q24. How do you identify network error and methods to rectify them

Ans.

To identify network errors, monitor network performance, analyze logs, use network troubleshooting tools, and rectify them by troubleshooting hardware, software, or configuration issues.

  • Monitor network performance to identify any anomalies or issues

  • Analyze network logs for error messages or patterns

  • Use network troubleshooting tools like ping, traceroute, or network analyzers

  • Troubleshoot hardware issues such as faulty cables, switches, or routers

  • Troubleshoot software issues li...read more

View 2 more answers

Q25. Wat do you understand about TAT and how is it useful

Ans.

TAT stands for Turnaround Time. It refers to the time taken to complete a process or task.

  • TAT is a measure of efficiency and productivity.

  • It helps in setting realistic expectations and deadlines.

  • TAT is crucial in customer service to ensure timely delivery of products or services.

  • For example, in IT operations, TAT can be used to measure the time taken to resolve technical issues.

  • TAT can also be used to track the time taken to process and approve operational requests.

View 1 answer

Q26. How recover a user file deleted or file /etc/passwd ?

Ans.

To recover a deleted user file or /etc/passwd, restore from backup or use data recovery tools.

  • Check if a backup of the file exists and restore it

  • If no backup is available, use data recovery tools like extundelete or scalpel

  • Stop writing to the disk immediately to prevent overwriting the deleted file

  • Consult with a professional if necessary

View 1 answer

Q27. how to check if the server of Facebook is up without opening the browser or app.

Ans.

Use command line tools like ping or curl to check server status.

  • Use ping command to check if server is reachable

  • Use curl command to check if server is responding with HTTP status code 200

  • Use telnet command to check if server is listening on a specific port

  • Use monitoring tools like Nagios or Zabbix to automate server status checks

Add your answer

Q28. How to check a user password status for any users ?

Ans.

To check a user password status, use the 'passwd' command with the '-S' option followed by the username.

  • Open the terminal or command prompt.

  • Type 'passwd -S ' and press Enter.

  • The password status will be displayed, indicating if the password is locked, expired, or active.

View 1 answer

Q29. How to find badis, different between user exit and customer exit

Ans.

Badis can be found using transaction code SE18. User exits are older and customer exits are newer enhancements in SAP.

  • Badis can be found using transaction code SE18.

  • User exits are older enhancements in SAP.

  • Customer exits are newer enhancements in SAP.

  • Badis provide a more flexible and object-oriented approach compared to user exits and customer exits.

  • Badis can be implemented multiple times, while user exits and customer exits can only be implemented once.

  • Badis are implemented ...read more

View 1 answer

Q30. What is debit, credit, inventory, debit note credit note suspense account ect..

Ans.

Debit and credit are accounting terms used to record financial transactions. Inventory is the stock of goods a company has on hand.

  • Debit is an entry on the left side of an account, while credit is an entry on the right side of an account.

  • Inventory is the stock of goods a company has on hand and is recorded as an asset on the balance sheet.

  • A debit note is a document used to inform a vendor of a debit made to their account.

  • A credit note is a document used to inform a vendor of ...read more

Add your answer

Q31. What are different modernizations you did on Mainframes ?

Ans.

Modernizations on Mainframes include migration to cloud, adoption of DevOps practices, and integration with modern technologies.

  • Migration of mainframe applications to cloud platforms like AWS or Azure

  • Adoption of DevOps practices for continuous integration and delivery

  • Integration of mainframe systems with modern technologies like APIs and microservices

  • Replacement of legacy mainframe applications with modern web or mobile applications

  • Implementation of modern security measures a...read more

View 1 answer

Q32. how many ways data pass jcl to cobol program ?

Ans.

Data can pass from JCL to COBOL program in multiple ways, such as through input files, system symbols, and program parameters.

  • Input files: Data can be passed to a COBOL program through input files specified in the JCL.

  • System symbols: JCL can define system symbols that can be accessed by the COBOL program to retrieve data.

  • Program parameters: JCL can pass parameters to the COBOL program, which can be used to receive data.

  • Environment variables: JCL can set environment variables ...read more

View 3 more answers

Q33. How is Warehouse Order created ? What is the logic behind the creation of Warehouse Order when there are 10 warehouse tasks ?

Ans.

Warehouse Orders are created based on the logic of prioritizing tasks and optimizing efficiency.

  • Warehouse Orders are created to manage the movement and storage of goods in a warehouse.

  • The creation of Warehouse Orders involves prioritizing tasks based on factors like urgency, location, and resource availability.

  • The logic behind creating Warehouse Orders is to optimize efficiency by grouping similar tasks together and minimizing travel time.

  • For example, if there are 10 warehous...read more

View 1 answer

Q34. Is it true that statistical models and Machine Learning are the same ?

Ans.

No, statistical models and Machine Learning are not the same.

  • Statistical models are based on mathematical equations and assumptions, while Machine Learning uses algorithms to learn patterns from data.

  • Statistical models require a priori knowledge of the data distribution, while Machine Learning can handle complex and unstructured data.

  • Statistical models are often used for hypothesis testing and parameter estimation, while Machine Learning is used for prediction and classificat...read more

Add your answer

Q35. What are polymorphism, abstraction, and encapsulation?

Ans.

Polymorphism, abstraction, and encapsulation are three fundamental concepts in object-oriented programming.

  • Polymorphism allows objects of different classes to be treated as if they are objects of the same class.

  • Abstraction is the process of hiding complex implementation details and showing only the necessary information to the user.

  • Encapsulation is the practice of keeping the internal workings of an object hidden from the outside world.

  • Examples of polymorphism include method ...read more

Add your answer

Q36. What architectural principles / methodologies you know ?

Ans.

Architectural principles and methodologies are fundamental concepts that guide the design and development of software systems.

  • Service-Oriented Architecture (SOA)

  • Microservices Architecture

  • Event-Driven Architecture (EDA)

  • Domain-Driven Design (DDD)

  • Layered Architecture

  • Component-Based Architecture

  • Model-View-Controller (MVC)

  • RESTful Architecture

  • Big Data Architecture

  • Cloud Computing Architecture

View 1 answer

Q37. What if, you are unable to find a supplier for the materials that you require.?

Ans.

If unable to find a supplier, explore alternative sources, negotiate with existing suppliers, or consider changing specifications.

  • Explore alternative sources such as online marketplaces or international suppliers

  • Negotiate with existing suppliers to see if they can provide the required materials or suggest alternative options

  • Consider changing specifications to align with available suppliers or materials

  • Collaborate with other departments or companies to pool resources and find ...read more

Add your answer

Q38. Explain how containers, docker and Kubernetes work with each other ? How do you connect to a container from public internet?

Add your answer

Q39. How we can check groups lists &amp; assinged users to them ?

Ans.

To check group lists and assigned users, we can use the 'getent' command in Linux and Unix systems.

  • Use the 'getent group' command to list all the groups and their details

  • To check the users assigned to a specific group, use 'getent group '

  • The output will display the group name, group ID, and a list of users assigned to the group

View 1 answer

Q40. What is design thinking, have you ever communicated with developers, what do you do when you do not have enough information but the deadline is already near?

Ans.

Design thinking is a problem-solving approach that focuses on understanding the user's needs and creating innovative solutions.

  • Design thinking involves empathizing with users, defining the problem, ideating solutions, prototyping, and testing.

  • Yes, I have communicated with developers to understand technical aspects and constraints of the project.

  • When lacking information near a deadline, I prioritize the most critical aspects, communicate with stakeholders for clarification, an...read more

Add your answer

Q41. What is use one as many, copy value function , format by example

Ans.

These are three different functions in SAP PI/PO used for mapping and transforming data.

  • Use One As Many: Splits one source field into multiple target fields

  • Copy Value Function: Copies the value of one field to another field

  • Format by Example: Formats the target field based on the example provided

Add your answer

Q42. Design a system for railway ticket booking

Ans.

Design a system for railway ticket booking

  • Create a user-friendly interface for booking tickets

  • Integrate payment gateway for secure transactions

  • Implement seat availability and reservation system

  • Include features for cancellation and refund

  • Develop a database to store user and ticket information

View 2 more answers

Q43. Introduction what do you mean SAP mm what is purchase order what is sub contracting vendor what moment type use in sub contracting, what is physical inventory

Ans.

SAP MM is a module that deals with material management. Purchase order is a document used to procure goods or services. Subcontracting vendor is a vendor who provides goods or services to a company. Movement types are used in sub-contracting to track the movement of goods. Physical inventory is a process of counting and verifying the inventory on hand.

  • SAP MM deals with material management

  • Purchase order is a document used to procure goods or services

  • Subcontracting vendor is a ...read more

Add your answer

Q44. What you will do if you got to know there is a performance issue in code change which you developed before 1 day of production deployment

Ans.

I would immediately investigate the issue and work to resolve it before the production deployment.

  • Check the logs to identify the root cause of the performance issue

  • Analyze the code changes made and identify any potential bottlenecks

  • Work with the development team to implement a fix for the issue

  • Perform thorough testing to ensure the fix does not introduce any new issues

  • Communicate the issue and resolution to stakeholders and management

View 2 more answers

Q45. how can we create a mirror pool &amp; what does it require for ?

Ans.

A mirror pool is a storage configuration that duplicates data across multiple drives for redundancy and improved performance.

  • A mirror pool is created using software RAID (Redundant Array of Independent Disks) technology.

  • It requires at least two drives to create a mirror pool.

  • The data written to one drive is automatically duplicated to the other drive in real-time.

  • If one drive fails, the data can still be accessed from the remaining drive.

  • Creating a mirror pool provides data r...read more

View 1 answer

Q46. 5) How to create a kafka topic with replication factor 2

Ans.

To create a Kafka topic with replication factor 2, use the command line tool or Kafka API.

  • Use the command line tool 'kafka-topics.sh' with the '--replication-factor' flag set to 2.

  • Alternatively, use the Kafka API to create a topic with a replication factor of 2.

  • Ensure that the number of brokers in the Kafka cluster is greater than or equal to the replication factor.

  • Consider setting the 'min.insync.replicas' configuration property to 2 to ensure that at least two replicas are ...read more

Add your answer

Q47. how to get distinct data without using distinct keyword

Ans.

To get distinct data without using distinct keyword, use GROUP BY clause.

  • Use GROUP BY clause with the column name to group the data by that column.

  • Use aggregate functions like COUNT, SUM, AVG, etc. to get the desired result.

  • Example: SELECT column_name FROM table_name GROUP BY column_name;

  • Example: SELECT column_name, COUNT(*) FROM table_name GROUP BY column_name;

Add your answer

Q48. What ac will be debited and credited at the time of discounting?

Ans.

The account to be debited and credited at the time of discounting depends on the specific transaction and the parties involved.

  • In general, the account to be debited is the Discount Allowed account, which represents the expense incurred by the seller for providing the discount.

  • The account to be credited is typically the Accounts Receivable account, which represents the amount owed by the buyer for the discounted goods or services.

  • However, the specific accounts may vary dependi...read more

View 1 answer

Q49. What is Android development

Ans.

Android development is the process of creating applications for the Android operating system.

  • Android development involves writing code in Java or Kotlin to create mobile applications.

  • It includes designing user interfaces, implementing functionality, and testing the app.

  • Developers use Android Studio, an integrated development environment (IDE), for building Android apps.

  • Android apps can be published on the Google Play Store and run on various devices.

  • Examples of Android apps i...read more

View 6 more answers

Q50. Write a program for highest odd number from 1 - 100 in java

Ans.

Program to find the highest odd number from 1-100 in Java

  • Loop through numbers 1-100

  • Check if the number is odd

  • If it is odd, check if it is greater than the current highest odd number

  • If it is, update the current highest odd number

  • Return the highest odd number

Add your answer

Q51. how to data insert or update in table ?

Ans.

To insert or update data in a table, use SQL statements like INSERT INTO or UPDATE.

  • For inserting data, use the INSERT INTO statement followed by the table name and column names.

  • Specify the values to be inserted using the VALUES keyword.

  • For updating data, use the UPDATE statement followed by the table name.

  • Set the column values to be updated using the SET keyword.

  • Use conditions with the WHERE clause to specify which rows to update.

View 2 more answers

Q52. How we can check all information destroy pool &amp; get back them ?

Ans.

To check all information destroy pool & get back them, we can use ZFS snapshots and clones.

  • ZFS snapshots and clones can be used to recover data from a destroyed pool.

  • Snapshots capture the state of the pool at a specific point in time.

  • Clones can be created from snapshots and mounted as a separate file system.

  • Data can be copied from the clone to the new pool.

  • It is important to regularly create snapshots to ensure data can be recovered in case of a disaster.

Add your answer

Q53. How do you receive input, what are DDLC and SDLC, what style guides have you used for creating documents, how do you ensure accuracy in your document.

Ans.

I receive input through meetings and emails, DDLC is Document Development Life Cycle, SDLC is Software Development Life Cycle, I use APA and Chicago style guides, I ensure accuracy through thorough research and review.

  • Receive input through meetings with subject matter experts and stakeholders

  • DDLC (Document Development Life Cycle) is the process of creating, editing, and publishing documents

  • SDLC (Software Development Life Cycle) is the process of developing software from plann...read more

Add your answer

Q54. What is use of activity creator

Ans.

The activity creator is used to create instances of an activity class in Android development.

  • The activity creator is responsible for instantiating an activity class.

  • It is typically used when starting a new activity from another activity.

  • The activity creator can pass data to the new activity through intent extras.

  • It is commonly used in the onCreate() method of the calling activity.

  • Example: Intent intent = new Intent(this, SecondActivity.class); startActivity(intent);

View 2 more answers

Q55. Can you tell me what is a difference between front end developer and backend developer

Ans.

Front end developers focus on the user interface and user experience, while backend developers handle the server-side logic and database management.

  • Front end developers work on the client-side of web development, creating the visual elements and interactions that users see and interact with.

  • They use languages like HTML, CSS, and JavaScript to build responsive and user-friendly websites.

  • Backend developers work on the server-side of web development, handling the behind-the-scen...read more

Add your answer

Q56. what is array ? how to load data ?

Ans.

An array is a data structure that stores a collection of elements of the same type.

  • Arrays can be used to store and access multiple values using a single variable.

  • To load data into an array of strings, you can assign values to each element individually or use a loop.

  • Example: String[] names = {"John", "Jane", "Mike"};

  • Example: for(int i = 0; i < names.length; i++) { names[i] = "Value" + i; }

View 3 more answers

Q57. How to know that in which directory we are sitting presently ?

Ans.

To know the current directory in Linux/Unix, use the 'pwd' command.

  • Type 'pwd' in the terminal and press enter.

  • The output will show the full path of the current directory.

  • Alternatively, you can use 'echo $PWD' to display the current directory path.

  • The command 'ls' can also be used to list the contents of the current directory.

Add your answer

Q58. How can we attach &amp;detach disk from a normal and mirror pool ?

Ans.

To attach & detach disk from normal and mirror pool, use zpool attach and zpool detach commands.

  • To attach a disk to a normal pool, use 'zpool attach poolname existing_device new_device'

  • To detach a disk from a normal pool, use 'zpool detach poolname device'

  • To attach a disk to a mirror pool, use 'zpool attach poolname existing_device mirror_device'

  • To detach a disk from a mirror pool, use 'zpool detach poolname mirror_device'

Add your answer

Q59. Your total experience is 6+ in SQL and SSIS, but your relevant experience in Datastage is 3+, and already you are on a higher package as compared with 3 years Datastage developer, we might tak a pause here as y...

read more
Ans.

My experience in SQL and SSIS has prepared me well for Datastage development. I am confident in my ability to quickly learn and excel in this role.

  • My experience in SQL and SSIS has given me a strong foundation in data integration and ETL processes.

  • I have already demonstrated my ability to learn quickly and adapt to new technologies, as evidenced by my success in my current role.

  • I am eager to expand my skillset and take on new challenges in Datastage development.

  • I am open to d...read more

Add your answer

Q60. What are the different types of AWS services used for handling Big Data in AWS. What are the storage services used ? What are the equivalents available in Azure?

Add your answer

Q61. 1. Difference between, IBP S&amp;OP Demand and IBP Demand. 2. What are the forecast models available in IBP S&amp;OP Demand. 3. How to configure Product life cycle in S&amp;OP Demand. 4. What is difference between IBP Supp...

read more
Add your answer

Q62. What were the challenges faced while do application migration on hybrid cloud? How to mitigate those things for successful delivery?

Ans.

Challenges in application migration on hybrid cloud and ways to mitigate them

  • Challenges include data security, network latency, and compatibility issues

  • Mitigation strategies include using encryption, optimizing network connectivity, and testing for compatibility

  • Proper planning and communication with stakeholders is crucial for successful delivery

Add your answer

Q63. In C# --&gt; Abstraction, Interface , Abstract Method, Abstract Class, Polymorphisms, Encapsulation ,Inheritance, Serialization,

Ans.

C# concepts including abstraction, interface, abstract method, abstract class, polymorphism, encapsulation, inheritance, and serialization.

  • Abstraction: hiding implementation details

  • Interface: defining a contract for behavior

  • Abstract method: method without implementation

  • Abstract class: class with one or more abstract methods

  • Polymorphism: ability of objects to take on multiple forms

  • Encapsulation: bundling data and behavior together

  • Inheritance: creating new classes from existing...read more

Add your answer

Q64. What is your knowledge on devops tools. Explain me the most challenging use case that you have done.

Ans.

I have knowledge on various devops tools and have worked on challenging use cases such as implementing continuous integration and deployment pipelines using Jenkins and Docker.

  • Proficient in using Jenkins, Docker, Git, Ansible, and Kubernetes

  • Implemented CI/CD pipelines for multiple projects

  • Automated deployment process using Ansible and Kubernetes

  • Implemented containerization using Docker and Kubernetes

  • Implemented infrastructure as code using Terraform

  • Challenging use case: Setti...read more

Add your answer

Q65. What is TCS. What is TAN. What is e way challan. What is SLA. What is one time vendor.

Ans.

TCS is Tax Collected at Source. TAN is Tax Deduction and Collection Account Number. E-way challan is an electronic waybill for transportation of goods. SLA is Service Level Agreement. One time vendor is a vendor who is used only once for a specific transaction.

  • TCS is a tax collected by the seller from the buyer at the time of sale.

  • TAN is a 10-digit alphanumeric number used as an identification number for persons deducting or collecting tax at source.

  • E-way challan is a documen...read more

Add your answer

Q66. What are performance enhancement practices you followed while a System got hanged or intermittent freezing?

Ans.

To enhance performance during system hang or intermittent freezing, we follow these practices:

  • Analyze system logs to identify the root cause of the issue

  • Check system resources like CPU, memory, disk usage, etc.

  • Optimize database performance by tuning parameters and indexes

  • Implement SAP recommended notes and patches

  • Monitor system performance regularly to identify potential issues

  • Implement load balancing and clustering to distribute workload

  • Use SAP tools like ST12, ST13, ST14, e...read more

Add your answer

Q67. From Java 1. What is class and object? 2. Describe OOPS concept 3. Details from Exception Handling Some basic questions ask from DBMS

Ans.

Questions related to Java and DBMS concepts

  • Class is a blueprint for creating objects, while object is an instance of a class

  • OOPS concepts include encapsulation, inheritance, polymorphism, and abstraction

  • Exception handling is a mechanism to handle runtime errors and prevent program crashes

  • DBMS questions may include SQL queries, normalization, and database design

Add your answer

Q68. What is your company's code review process? What practices you follow while writing code. How do you test your code manually?

Ans.

Our code review process involves peer reviews and automated testing. We follow best practices and use manual testing for edge cases.

  • Peer reviews are conducted for all code changes before merging into the main branch

  • We use automated testing tools like Jest and Enzyme for unit and integration testing

  • We follow best practices like writing clean and modular code, using meaningful variable names, and commenting where necessary

  • Manual testing is used for edge cases and scenarios that...read more

Add your answer

Q69. What do you understand about DevOps and how do you achieve it in public cloud ? What services and settings are to be done in AWS or Azure for creating the CICD pipeline?

Add your answer

Q70. What is the difference between CDD and EDD

Ans.

CDD is basic due diligence while EDD is enhanced due diligence.

  • CDD is a standard process of verifying the identity of a customer and assessing the risk associated with them.

  • EDD is a more thorough process that involves gathering additional information about the customer to mitigate higher risks.

  • CDD is typically used for low-risk customers while EDD is used for high-risk customers.

  • Examples of EDD include conducting background checks, reviewing financial statements, and obtainin...read more

View 1 answer

Q71. List the activities an architect should perform to handle the disaster recovery of the application and the database. How do you handle it with minimum RTO and RPO?

Add your answer

Q72. What we are considered profit or loss how to create in your point of you

Ans.

Profit or loss is created by comparing revenue and expenses.

  • Profit is created when revenue exceeds expenses.

  • Loss is created when expenses exceed revenue.

  • Net income is calculated by subtracting expenses from revenue.

  • Profit and loss statement shows the financial performance of a company.

  • Profitability ratios like gross profit margin and net profit margin are used to analyze profit or loss.

  • Accrual accounting recognizes revenue and expenses when they are earned or incurred, while ...read more

Add your answer

Q73. Management types in snow and in how many days can join

Ans.

The question is unclear and requires clarification.

  • The question needs to be rephrased for better understanding.

  • It is unclear what is meant by 'management types in snow'.

  • The number of days it takes to join is also unclear.

  • Further clarification is needed to provide an accurate answer.

Add your answer

Q74. What is structuring or round dollar , or what is three type money laundering … what is threshold … country based questions they can ask

Add your answer

Q75. How will you check if a pod in ReplicaSet went down or failed and what was the reason for the same?

Ans.

To check if a pod in ReplicaSet went down or failed, monitor the pod status, logs, and events.

  • Monitor the pod status using kubectl get pods command

  • Check the pod logs for any error messages using kubectl logs command

  • Review the events related to the pod using kubectl describe pod command

  • Set up alerts or notifications for pod failures using monitoring tools like Prometheus or Grafana

Add your answer

Q76. Describe the entire POC Process you followed while migrating your SAP On-Premise System to the Google Cloud Platform. ( Technical Specs and Errors Encountered). Observations regarding the Sizing and Output.

Ans.

Outlined POC process for migrating SAP On-Premise System to Google Cloud Platform

  • Analyzed current system and determined necessary resources for migration

  • Created a test environment to ensure compatibility and identify errors

  • Used Cloud Migration for SAP tool to migrate data and configurations

  • Encountered errors with network connectivity and resolved through troubleshooting

  • Monitored system performance and made necessary adjustments for optimal output

Add your answer

Q77. Big data Hadoop architecture and HDFS commands to copy and list files in hdfs spark architecture and Transformation and Action question what happen when we submit spark program spark dataframe coding question s...

read more
Ans.

Questions on big data, Hadoop, Spark, Scala, Git, project and Agile.

  • Hadoop architecture and HDFS commands for copying and listing files in HDFS

  • Spark architecture and Transformation and Action question

  • What happens when we submit a Spark program

  • Spark DataFrame coding question

  • Scala basic program on List

  • Git and Github

  • Project-related question

  • Agile-related

Add your answer

Q78. Which programming language are you familiar with ? Do you know R ?

Ans.

Yes, I am familiar with R.

  • I have experience in data analysis and visualization using R.

  • I have used R for statistical modeling and machine learning.

  • I am comfortable with R packages such as ggplot2, dplyr, and tidyr.

Add your answer

Q79. Difference between SOAP &amp; REST, remove and collapse context, file and sftp?

Ans.

SOAP is a protocol for exchanging structured information, while REST is an architectural style for building web services.

  • SOAP uses XML to encode messages, while REST uses a variety of formats such as JSON, XML, or plain text.

  • SOAP is more rigid and requires more bandwidth, while REST is more flexible and lightweight.

  • Remove context is used to remove the context of a message, while collapse context is used to collapse the context of a message.

  • File is used to transfer files betwe...read more

Add your answer

Q80. What is the difference between Index and subscript?

Ans.

Index and subscript are used to access elements in an array or list, but index refers to the position while subscript refers to the value.

  • Index is the position of an element in an array or list, starting from 0.

  • Subscript is the value used to access an element in an array or list.

  • For example, in the array [1, 2, 3], the index of 2 is 1 and the subscript of 2 is 2.

  • Index is an integer while subscript can be any data type that can be used as an index.

  • Index is used in programming ...read more

Add your answer

Q81. what you should see in the show interface type/member/module/number?

Ans.

The show interface command displays the status and statistics of a network interface.

  • Displays the interface type, member, module, and number

  • Shows the current status of the interface (up or down)

  • Displays the number of packets transmitted and received

  • Shows the number of errors and discards

  • Displays the speed and duplex settings of the interface

Add your answer

Q82. How to you prepare EMI and balance sheet end of the month or year reporting how to prepare

Ans.

To prepare EMI and balance sheet end of the month or year reporting, follow these steps:

  • Ensure all transactions are recorded accurately and completely

  • Reconcile bank statements and other accounts

  • Prepare adjusting entries for accruals and deferrals

  • Organize accounts into appropriate categories for the balance sheet

  • Calculate EMI based on loan amount, interest rate, and term

  • Verify accuracy of all calculations

  • Prepare financial statements and reports

  • Review and analyze financial data...read more

Add your answer
Q83. Technical Question

Match the orientations according to the rotation degrees suggested

Add your answer

Q84. What is the advantage of SLT Replication compared to other replication Methods?

Ans.

SLT Replication offers real-time data replication with minimal system impact.

  • SLT Replication allows for real-time data replication from multiple sources to a single target system.

  • It offers minimal system impact as it uses trigger-based replication instead of full table scans.

  • SLT Replication also provides data transformation capabilities and supports heterogeneous data replication.

  • Compared to other replication methods, SLT Replication is more efficient and cost-effective.

  • For e...read more

Add your answer

Q85. Name any four situations where we have to create a Bank Reconciliation Statement.

Ans.

Four situations where we have to create a Bank Reconciliation Statement

  • When there is a discrepancy between the bank balance and the company's books

  • When there are outstanding checks or deposits in transit

  • When there are bank errors or fees that need to be reconciled

  • When there are adjustments for interest earned or bank charges

Add your answer

Q86. How we scan a LUN &amp; check the wwn number ?

Ans.

To scan a LUN and check the wwn number, use the 'multipath' command.

  • Run 'multipath -ll' to list all the available LUNs and their wwn numbers.

  • To scan for new LUNs, run 'echo '- - -' > /sys/class/scsi_host/hostX/scan' (replace X with the appropriate host number).

  • Use 'multipath -v3' for verbose output and troubleshooting.

  • Ensure that the necessary drivers and modules are loaded for the storage device.

  • Check the system logs for any errors or warnings related to the LUN or storage d...read more

Add your answer

Q87. What's the ad value of bgp and bgp States?

Ans.

BGP (Border Gateway Protocol) is a routing protocol used in internet networks. It provides scalability, redundancy, and policy control.

  • BGP is used to exchange routing information between different autonomous systems (AS)

  • It allows for efficient routing decisions based on policies and network conditions

  • BGP states represent the different stages of establishing and maintaining BGP peering sessions

  • Examples of BGP states include Idle, Connect, Active, OpenSent, OpenConfirm, Establi...read more

View 2 more answers

Q88. How do you calculate the cost implications when proposing an architecture? What are the steps involved in migrating an existing application to Cloud?

Add your answer
Asked in
ASE Interview

Q89. What is Data Structure? why we use Data Structure?what is Array?Difference between array and variable. Difference between array and Data structure.

Ans.

Data structure is a way of organizing and storing data in a computer so that it can be accessed and used efficiently.

  • Data structure is used to manage and manipulate data effectively.

  • Array is a type of data structure that stores a fixed-size sequential collection of elements of the same type.

  • Variables are used to store a single value, while arrays can store multiple values of the same type.

  • Data structure is a broader term that includes arrays and other types of structures like...read more

Add your answer

Q90. What are modules in Terraform, share your screen and write module

Ans.

Modules in Terraform are reusable components that allow you to encapsulate and organize your infrastructure code.

  • Modules help in breaking down complex infrastructure into smaller, manageable components

  • They promote reusability and maintainability of code

  • Modules can be shared and used across different projects

  • Example: Creating a module for provisioning a virtual machine in Azure

Add your answer

Q91. How would you provide security to your credentials while using Terraform

Ans.

Use encrypted variables, limit access to credentials, and utilize secure storage solutions.

  • Encrypt sensitive variables using tools like Vault or AWS KMS

  • Limit access to credentials by using least privilege principles

  • Store credentials securely in a password manager or key vault

  • Avoid hardcoding credentials in Terraform configuration files

Add your answer

Q92. If you are using CICD define your stages and issues you faced

Ans.

CICD stages include build, test, deploy, and monitor. Common issues include integration challenges and pipeline failures.

  • Stages: Build, Test, Deploy, Monitor

  • Issues: Integration challenges, Pipeline failures

  • Example: Integration challenges with third-party tools delaying deployment

Add your answer

Q93. Will you be able to work if given any type of work like either DevOps or only Cloud or only Development?

Ans.

Yes, I am capable of working in various roles such as DevOps, Cloud, and Development.

  • I have experience and skills in DevOps practices such as automation, CI/CD, and infrastructure as code.

  • I am proficient in cloud technologies like AWS, Azure, or Google Cloud Platform.

  • I have a strong background in software development with expertise in languages like Python, Java, or JavaScript.

Add your answer

Q94. How to secure our system security user mangement ?

Ans.

To secure system security user management, follow best practices such as strong passwords, regular audits, limited privileges, and multi-factor authentication.

  • Enforce strong password policies

  • Regularly audit user accounts and access permissions

  • Implement least privilege principle

  • Enable multi-factor authentication

  • Disable unnecessary user accounts

  • Regularly update and patch the system

  • Implement intrusion detection and prevention systems

  • Encrypt sensitive data

  • Monitor system logs for ...read more

View 1 answer

Q95. What are the programming languages on which I have knowledge regarding.

Ans.

I have knowledge in multiple programming languages.

  • Java

  • Python

  • C++

  • JavaScript

Add your answer

Q96. What are the types of clouds?

Ans.

There are three types of clouds: public, private, and hybrid.

  • Public clouds are owned and operated by third-party providers, and the infrastructure is shared among multiple organizations.

  • Private clouds are dedicated to a single organization and can be located on-premises or hosted by a third-party provider.

  • Hybrid clouds combine public and private clouds, allowing organizations to take advantage of the benefits of both.

  • Examples of public clouds include Amazon Web Services (AWS)...read more

Add your answer

Q97. Statement vs prepared statements(whats the use of pstmts over stmts), why microservice when the same can happen in monolithic(Not normal differences expected something else), how Rest API will work (internal pr...

read more
Ans.

Prepared statements are precompiled SQL statements that can improve performance and security. Microservices offer scalability and flexibility over monolithic architecture. REST API works by using HTTP methods to interact with resources.

  • Prepared statements are precompiled SQL statements that can be reused multiple times, improving performance by reducing database load and preventing SQL injection attacks.

  • Microservices allow for independent deployment, scalability, and flexibil...read more

Add your answer

Q98. Technical Round: Different types of wait with differences between explicit and fluent wait

Ans.

Explicit and fluent wait are types of wait used in test automation to handle synchronization issues.

  • Explicit wait is used to wait for a specific condition to occur before proceeding further in the test script.

  • Fluent wait is used to wait for a condition with a defined polling frequency and timeout duration.

  • Explicit wait provides more control and flexibility as it allows specifying the condition and the maximum wait time.

  • Fluent wait provides a more fluent and readable way of wa...read more

View 2 more answers

Q99. From which scenario we can identify that HANA Database has an issue which is caused by Memory?

Ans.

HANA Database memory issue identification scenario

  • High memory consumption by HANA processes

  • Frequent garbage collection

  • Slow query performance

  • Out of memory errors in HANA logs

  • Memory-related alerts in HANA monitoring tools

Add your answer

Q100. 4) How to read json data using spark

Ans.

To read JSON data using Spark, use the SparkSession.read.json() method.

  • Create a SparkSession object

  • Use the read.json() method to read the JSON data

  • Specify the path to the JSON file or directory containing JSON files

  • The resulting DataFrame can be manipulated using Spark's DataFrame API

View 2 more answers
1
2
3
4
5
6
7

More about working at IBM

Top Rated Mega Company - 2024
Top Rated Company for Women - 2024
Top Rated IT/ITES Company - 2024
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Thermo Systems India

based on 913 interviews in the last 1 year
Interview experience
4.2
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.5
 • 308 Interview Questions
4.0
 • 242 Interview Questions
4.1
 • 224 Interview Questions
3.3
 • 142 Interview Questions
3.6
 • 139 Interview Questions
4.0
 • 135 Interview Questions
View all
Top IBM Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter