Add office photos
IBM logo
Engaged Employer

IBM

Verified
4.0
based on 22.1k Reviews
Video summary
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
Designation
Fresher
Experienced
Skills

1000+ IBM Interview Questions and Answers

Updated 21 Feb 2025
Popular Designations

Q101. Can we modify user password and name ?

Ans.

Yes, as a Linux and Unix System Administrator, you can modify user passwords and names.

  • To modify a user's password, you can use the 'passwd' command followed by the username.

  • To modify a user's name, you can use the 'usermod' command followed by the username and the '-l' option to change the login name.

  • Make sure to have the necessary permissions to modify user information.

View 2 more answers
right arrow

Q102. Explain in detail the architecture , real time use case of containers and how do we manage or orchestrate them. explain dockerfile commands, docker-compose, kubernetes yaml file contents, kubernetes deployment.

Ans.

Containers are lightweight, portable, and isolated environments that package applications and their dependencies.

  • Containers are instances of images that include the application and all its dependencies, allowing for easy deployment and scaling.

  • Docker is a popular containerization platform that uses Dockerfiles to define the image build process.

  • Docker-compose is a tool for defining and running multi-container Docker applications.

  • Kubernetes is a container orchestration platform...read more

Add your answer
right arrow
IBM Interview Questions and Answers for Freshers
illustration image

Q103. What will happen if I won't maintain account modifier?

Ans.

Not maintaining account modifier can lead to incorrect financial reporting and accounting errors.

  • Account modifier is used to differentiate between different types of transactions in financial reporting.

  • If not maintained, it can lead to incorrect financial statements and accounting errors.

  • For example, if a company has multiple revenue streams, not maintaining account modifier can lead to revenue from different streams being reported together, leading to incorrect financial ana...read more

Add your answer
right arrow

Q104. Name the service which is required for time sync and how to configure it?

Ans.

The service required for time sync is Network Time Protocol (NTP).

  • NTP is a protocol used to synchronize the clocks of computers over a network.

  • It ensures accurate timekeeping and consistency across systems.

  • To configure NTP, the administrator needs to specify NTP servers in the system's configuration file.

  • Examples of NTP servers are time.google.com, pool.ntp.org, etc.

  • The system periodically queries the NTP servers to adjust its clock accordingly.

View 1 answer
right arrow
Discover IBM interview dos and don'ts from real experiences

Q105. When to use and not to use NoSQL databases such as Redis, Cassandra and MongoDB.

Ans.

NoSQL databases like Redis, Cassandra, and MongoDB should be used when dealing with large amounts of unstructured data.

  • Use NoSQL databases when dealing with large amounts of unstructured data

  • Use NoSQL databases when scalability is a concern

  • Use NoSQL databases when flexibility is needed

  • Do not use NoSQL databases when dealing with structured data

  • Do not use NoSQL databases when ACID compliance is required

Add your answer
right arrow

Q106. Have you heard about the Hybrid cloud?

Ans.

Yes, Hybrid cloud is a combination of public and private cloud infrastructure.

  • Hybrid cloud allows organizations to leverage the benefits of both public and private cloud infrastructure.

  • It provides flexibility, scalability, and cost-effectiveness.

  • For example, an organization can use a public cloud for non-sensitive data and a private cloud for sensitive data.

  • Hybrid cloud also allows for workload portability and disaster recovery options.

  • It requires proper planning and manageme...read more

Add your answer
right arrow
Are these interview questions helpful?

Q107. what is lan, network provider, speak on any topic for 5 min

Ans.

LAN is a local area network that connects devices within a limited area. Network providers offer internet services to customers.

  • LAN is a computer network that covers a small geographic area, such as a home, office, or building.

  • It allows devices to communicate with each other and share resources like printers and files.

  • Network providers offer internet services to customers, such as cable, DSL, or fiber optic connections.

  • They provide the infrastructure and technology necessary ...read more

Add your answer
right arrow

Q108. What is a role of support engineer

Ans.

A support engineer is responsible for providing technical assistance and resolving issues related to software or hardware systems.

  • Providing technical support to customers or end-users

  • Troubleshooting and resolving software or hardware issues

  • Installing, configuring, and maintaining systems

  • Monitoring system performance and identifying potential problems

  • Collaborating with development teams to address bugs or enhancements

  • Documenting support processes and creating knowledge base ar...read more

View 1 answer
right arrow
Share interview questions and help millions of jobseekers 🌟
man with laptop

Q109. What is the HANA Performance Improvement that you have done?

Ans.

Implemented HANA table partitioning and index optimization resulting in 50% faster query performance.

  • Implemented table partitioning based on frequently accessed data

  • Optimized indexes to reduce data retrieval time

  • Tuned HANA parameters for better memory allocation

  • Reduced data footprint by archiving historical data

  • Implemented data compression to reduce storage requirements

View 1 answer
right arrow

Q110. what are the optimization techniques used in your project

Ans.

Optimization techniques used in project

  • Caching

  • Parallel processing

  • Compression

  • Indexing

  • Query optimization

Add your answer
right arrow

Q111. What is the range of private ip address?

Ans.

The range of private IP addresses is defined by three blocks: 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255.

  • Private IP addresses are used within private networks and are not routable on the internet.

  • The three blocks of private IP addresses are reserved for use in local area networks (LANs) and are not unique globally.

  • Private IP addresses allow organizations to have multiple devices with the same IP addresses within their private ...read more

View 2 more answers
right arrow

Q112. How do you monitor your application and what are the configurations?

Ans.

Application monitoring is done through various tools and configurations.

  • We use tools like Nagios, Zabbix, and Prometheus for monitoring.

  • We configure alerts for critical events and set up dashboards for easy visualization.

  • We also use log aggregation tools like ELK stack to monitor application logs.

  • We monitor system resources like CPU, memory, and disk usage.

  • We perform load testing to identify performance bottlenecks.

  • We use APM tools like New Relic and AppDynamics to monitor ap...read more

Add your answer
right arrow

Q113. Replace a sub-string in a string.

Ans.

To replace a sub-string in a string, use the replace() method.

  • Use the replace() method with the old sub-string and new sub-string as arguments.

  • The replace() method only replaces the first occurrence of the sub-string by default.

  • To replace all occurrences, use a regular expression with the global flag.

  • Example: 'hello world'.replace('world', 'universe') returns 'hello universe'.

  • Example: 'hello world'.replace(/world/g, 'universe') returns 'hello universe'.

View 1 answer
right arrow

Q114. What is purchase requestition ?

Ans.

A purchase requisition is a document used to request goods or services from a supplier.

  • It is a formal request for procurement of goods or services.

  • It includes details such as quantity, description, and estimated cost.

  • It is typically initiated by a department or individual within an organization.

  • It is used to obtain approval for the purchase before it is made.

  • It is an important part of the procurement process.

  • Example: A department within a company needs to purchase new compute...read more

Add your answer
right arrow

Q115. Tell all process of patch management by stepwise ?

Ans.

Patch management process involves identifying, testing, deploying, and verifying patches.

  • Identify vulnerabilities and available patches

  • Test patches in a non-production environment

  • Deploy patches to production systems

  • Verify successful patch installation and functionality

  • Monitor for any issues or new vulnerabilities

  • Repeat the process regularly

  • Use automation tools for efficiency

Add your answer
right arrow

Q116. Difference between final, finalize and finally ?

Ans.

final, finalize and finally are three different keywords in Java with different meanings.

  • final is a keyword used to declare a constant variable.

  • finalize is a method used for garbage collection.

  • finally is a block used in exception handling to execute code regardless of whether an exception is thrown or not.

  • final and finally are not related in any way.

View 1 answer
right arrow

Q117. soc 7 abend how to find ? resolve it ?

Ans.

S0C7 abend is a mainframe error caused by invalid data. It can be resolved by identifying the source of the error and correcting it.

  • S0C7 abend is caused by invalid data in a numeric field

  • To resolve it, identify the source of the error and correct it

  • Common causes include incorrect data types, invalid characters, and overflow

  • Debugging tools like IBM Debug Tool can help identify the source of the error

View 3 more answers
right arrow

Q118. 1. Why we go for microservice architecture 2. What is circuit breaker 3. What is service discovery 4.disadvantages of microservice 5. Disadvantage of stream api 6. Why we need default methods in functional inte...

read more
Ans.

Answers to questions related to microservice architecture, circuit breaker, service discovery, disadvantages of microservice, disadvantage of stream API, and default methods in functional interface.

  • Microservice architecture allows for scalability, flexibility, and easier maintenance of complex systems.

  • Circuit breaker is a design pattern used to prevent cascading failures in distributed systems.

  • Service discovery is the process of automatically detecting and locating services i...read more

Add your answer
right arrow

Q119. Wat is a network printer and it's functions

Ans.

A network printer is a printer that is connected to a computer network and can be accessed by multiple users.

  • A network printer allows multiple users to print documents from different devices connected to the same network.

  • It eliminates the need for individual printers for each user or device.

  • Network printers can be wired or wireless, depending on the network setup.

  • They often have additional features like scanning, copying, and faxing capabilities.

  • Network printers can be manage...read more

View 2 more answers
right arrow

Q120. What is protocols ? what's difference between protocol & closure ?

Ans.

Protocols are a set of rules or guidelines for communication between different objects. Closures are blocks of code that can be passed around and executed later.

  • Protocols define a blueprint of methods, properties, and other requirements that a class or structure must implement.

  • Closures capture and store references to any constants and variables from the context in which they are defined.

  • Protocols are used to define a set of methods that can be implemented by any class, struct...read more

Add your answer
right arrow

Q121. 2) Difference between partitioning and Bucketing

Ans.

Partitioning is dividing data into smaller chunks based on a column value. Bucketing is dividing data into equal-sized buckets based on a hash function.

  • Partitioning is used for organizing data for efficient querying and processing.

  • Bucketing is used for evenly distributing data across nodes in a cluster.

  • Partitioning is done based on a column value, such as date or region.

  • Bucketing is done based on a hash function, such as MD5 or SHA-1.

  • Partitioning can improve query performance...read more

View 1 answer
right arrow

Q122. What is the Docker? what is the best practice of writing a docker file?

Ans.

Docker is a containerization platform that allows developers to package and deploy applications in a portable manner.

  • Dockerfile is a script that contains instructions to build a Docker image

  • Best practices include keeping the image size small, using a single process per container, and using environment variables for configuration

  • Use multi-stage builds to reduce image size and improve security

  • Avoid running containers as root to minimize security risks

  • Regularly update base image...read more

Add your answer
right arrow

Q123. How will respond when you are the only one available on weekend , whenever there are client pings or user pings

Ans.

I will prioritize urgent client or user pings and respond promptly to address their needs.

  • Prioritize urgent client or user pings over non-urgent ones

  • Respond promptly to address their needs

  • Communicate with the client or user to understand the issue and provide assistance

  • Document the issue and resolution for future reference

View 1 answer
right arrow

Q124. What skills do you think a web designer is required to have

Ans.

A web designer is required to have skills in graphic design, coding, user experience, and communication.

  • Proficiency in graphic design software such as Adobe Photoshop and Illustrator

  • Strong coding skills in HTML, CSS, and JavaScript

  • Understanding of user experience principles and best practices

  • Effective communication skills to collaborate with clients and team members

View 1 answer
right arrow

Q125. How to validate the po ?

Ans.

To validate a PO, check for accuracy, completeness, and compliance with procurement policies.

  • Verify that the PO number matches the one in the system

  • Ensure that the vendor information is correct

  • Check that the items ordered match the specifications and quantities requested

  • Confirm that the prices are accurate and in line with the budget

  • Ensure that the PO is authorized and approved by the appropriate personnel

  • Check that the delivery date and location are correct

  • Verify that the te...read more

Add your answer
right arrow

Q126. DeadLockAsked to write code to insert a node in its correct location, given a sorted linked list.Asked to find least common ancestor given two nodes and the root; given a BST

Ans.

Insert a node in correct location in a sorted linked list and find least common ancestor in a BST.

  • For inserting a node in a sorted linked list, traverse the list while comparing node values and insert the new node in its correct position.

  • For finding the least common ancestor in a BST, start from the root and traverse down the tree while comparing node values with the given nodes.

Add your answer
right arrow

Q127. Router components service angular performance optimization how to scale app, security

Ans.

Optimizing Angular app performance and security with router components and services

  • Use lazy loading to improve performance

  • Implement caching for frequently accessed data

  • Use Angular Universal for server-side rendering

  • Implement HTTPS and secure authentication for security

  • Use guards and interceptors to protect routes and prevent unauthorized access

Add your answer
right arrow

Q128. waterfall model in software development life cycle

Ans.

Waterfall model is a linear sequential approach to software development.

  • It follows a sequential flow from requirements gathering to testing and maintenance.

  • Each phase must be completed before moving on to the next.

  • Changes are difficult to implement once a phase is completed.

  • Suitable for projects with well-defined requirements and stable technology.

  • Examples include building a bridge or a physical product.

View 1 answer
right arrow

Q129. What is DNS,DHCP,IP address,RJ-45?

Ans.

DNS is a system that translates domain names into IP addresses. DHCP is a protocol for assigning IP addresses. IP address is a unique identifier for devices. RJ-45 is a type of connector used for Ethernet cables.

  • DNS translates domain names (e.g., www.example.com) into IP addresses (e.g., 192.168.1.1).

  • DHCP is a protocol that automatically assigns IP addresses to devices on a network.

  • An IP address is a numerical label assigned to each device connected to a computer network.

  • RJ-4...read more

View 1 answer
right arrow

Q130. Difference between standard order and rush order? How the delivery is created immediately in rush order, where are the controls?

Ans.

Standard orders have regular delivery times while rush orders require immediate delivery. Controls for rush orders are typically set in the system.

  • Standard orders have regular delivery times based on the company's standard processing and shipping times.

  • Rush orders are prioritized for immediate delivery, often with expedited processing and shipping.

  • Controls for rush orders are usually set in the system, such as flagging the order as a rush order or assigning it to a specific t...read more

Add your answer
right arrow

Q131. How to check whether a file in empty or not using JCL.

Ans.

Checking if a file is empty using JCL

  • Use the IDCAMS utility to check the file's status

  • Check the file's record count using the LISTCAT command

  • Use the SORT utility to check if the file has any records

  • Use the DFSORT utility to check if the file has any records

Add your answer
right arrow

Q132. What is ip address , local user and roaming user , organization unit, Active director domain service, DNS, hyper-v

Ans.

Explanation of IP address, local and roaming users, organization unit, Active Directory Domain Service, DNS, and Hyper-V.

  • IP address is a unique numerical identifier assigned to each device on a network.

  • Local user is a user account that is created on a specific device and can only be used on that device.

  • Roaming user is a user account that can be used on multiple devices within a network.

  • Organization unit is a container object in Active Directory used to organize and manage net...read more

Add your answer
right arrow

Q133. What is meant by accounts payable?

Ans.

Accounts payable refers to the amount of money a company owes to its suppliers or vendors for goods or services received.

  • Accounts payable is a liability on the balance sheet.

  • It represents the company's short-term obligations to pay for goods or services.

  • It includes invoices, bills, and other payment obligations.

  • Accounts payable is typically recorded when goods or services are received, but payment has not yet been made.

  • Examples of accounts payable include utility bills, inven...read more

View 3 more answers
right arrow

Q134. How to activate Boot Environment back up ?

Ans.

To activate Boot Environment back up, use the beadm command.

  • Use the beadm command with the activate option followed by the name of the Boot Environment.

  • For example, to activate the Boot Environment named 'BE1', use the command 'beadm activate BE1'.

  • This will make the Boot Environment the default one at the next system reboot.

Add your answer
right arrow

Q135. What are the troubleshooting you will do when you are not able to connect to a server?

Ans.

I will check network connectivity, firewall settings, and server status.

  • Check if the server is powered on and running

  • Verify network connectivity between the client and server

  • Check firewall settings to ensure the server is not blocked

  • Check if the server is reachable via ping or telnet

  • Check server logs for any errors or issues

  • Verify DNS settings are correct

Add your answer
right arrow

Q136. 3) Difference between cache and persistent storage

Ans.

Cache is temporary storage used to speed up access to frequently accessed data. Persistent storage is permanent storage used to store data even after power loss.

  • Cache is faster but smaller than persistent storage

  • Cache is volatile and data is lost when power is lost

  • Persistent storage is non-volatile and data is retained even after power loss

  • Examples of cache include CPU cache, browser cache, and CDN cache

  • Examples of persistent storage include hard disk drives, solid-state driv...read more

View 2 more answers
right arrow

Q137. Explain in breif and adding real experience stories how to solve problems.

Ans.

Problem-solving involves identifying, analyzing, and resolving issues to achieve desired outcomes.

  • Define the problem and gather information

  • Brainstorm potential solutions

  • Evaluate and select the best solution

  • Implement the solution and monitor its effectiveness

  • Adjust the solution as needed

  • Real experience story: During a project, we faced a challenge with a vendor who was not meeting our expectations. We defined the problem, gathered data, and brainstormed potential solutions. We...read more

Add your answer
right arrow

Q138. What does Principal Component Analysis do?

Ans.

Principal Component Analysis is a statistical technique used to reduce the dimensionality of a dataset while retaining important information.

  • PCA identifies the underlying structure in the data by finding the directions of maximum variance.

  • It transforms the data into a new coordinate system where the first axis has the highest variance, followed by the second, and so on.

  • The transformed data can be used for visualization, clustering, or classification.

  • PCA assumes that the data ...read more

Add your answer
right arrow

Q139. What is code inspector , what is assistance class

Ans.

Code Inspector is a tool to check code quality. Assistance class is a reusable class to provide common functionality.

  • Code Inspector checks for syntax errors, performance issues, security vulnerabilities, and adherence to coding standards.

  • Assistance class provides reusable code for common functionality like date and time calculations, string operations, and database access.

  • Assistance class can be used in multiple programs, reducing code duplication and improving maintainabilit...read more

Add your answer
right arrow

Q140. What do you know of Agile Methodology and Scrum?

Ans.

Agile Methodology and Scrum are popular project management frameworks used in software development.

  • Agile Methodology is a flexible approach to software development that emphasizes incremental delivery, collaboration, and continuous improvement.

  • Scrum is a specific Agile framework that divides work into sprints, with daily stand-up meetings and regular reviews.

  • Scrum roles include Product Owner, Scrum Master, and Development Team.

  • Scrum artifacts include Product Backlog, Sprint B...read more

Add your answer
right arrow

Q141. Have you worked with any version control systems?

Ans.

Yes, I have experience working with version control systems.

  • I have used Git for version control in my previous roles.

  • I am familiar with branching, merging, and resolving conflicts in Git.

  • I have also worked with SVN (Subversion) in the past.

Add your answer
right arrow

Q142. diiferent types of joints? implementation of joints ? what is joints?

Ans.

Joints are connections between bones that allow movement. There are different types of joints and their implementation varies.

  • Types of joints include hinge, ball-and-socket, pivot, saddle, and gliding joints.

  • Joints are implemented through the use of ligaments, tendons, and muscles.

  • Examples of joints include the knee joint, shoulder joint, and hip joint.

  • Joints can be affected by various conditions such as arthritis and injuries.

  • Proper care and exercise can help maintain health...read more

Add your answer
right arrow

Q143. what all financial application you can work on?

Ans.

I can work on various financial applications including accounting software, financial analysis tools, and investment management platforms.

  • Proficient in using accounting software such as QuickBooks and Xero

  • Skilled in financial analysis tools like Excel and Bloomberg Terminal

  • Familiar with investment management platforms such as E*TRADE and TD Ameritrade

  • Experience in using financial modeling software like MATLAB and R

  • Knowledgeable in using ERP systems like SAP and Oracle

Add your answer
right arrow

Q144. How do you prepare of ledger posting

Ans.

Ledger posting involves recording financial transactions in the appropriate accounts.

  • Identify the accounts affected by the transaction

  • Determine the type of account (asset, liability, equity, revenue, expense)

  • Debit or credit the appropriate account based on the transaction type

  • Record the transaction in the general ledger

  • Ensure accuracy and completeness of the posting

Add your answer
right arrow

Q145. Explain the entire process of your DevOps project? what are the components of Kubernetes?

Ans.

The DevOps project involves continuous integration, delivery, and deployment of software. Kubernetes components include pods, services, deployments, and namespaces.

  • The DevOps process starts with developers committing code to a version control system like Git.

  • The code is then built and tested using continuous integration tools like Jenkins.

  • The built code is packaged into containers using tools like Docker.

  • The containers are deployed to a Kubernetes cluster using tools like kub...read more

Add your answer
right arrow

Q146. What is the DBMS and What is use of DBMS?

Ans.

DBMS stands for Database Management System. It is used to manage and organize data in a structured manner.

  • DBMS is a software system that allows users to define, create, maintain and control access to databases.

  • It provides a way to store and retrieve data efficiently and effectively.

  • DBMS helps in maintaining data integrity, security and consistency.

  • Examples of DBMS include MySQL, Oracle, SQL Server, MongoDB, etc.

Add your answer
right arrow

Q147. Which server and version is being used and how to configure the data source in WebLogic server

Ans.

The server being used is WebLogic and the version is not specified. Data source can be configured through the console or configuration files.

  • WebLogic server is being used

  • Version is not specified

  • Data source can be configured through console or configuration files

Add your answer
right arrow

Q148. How the process flow in Restful service

Ans.

Restful service process flow involves client sending requests to server, which responds with data in a standardized format.

  • Client sends HTTP request to server

  • Server processes request and sends back HTTP response

  • Response is in a standardized format such as JSON or XML

  • Client can then use the response data as needed

View 2 more answers
right arrow

Q149. What is cutting edge technology emerging in IT industry ?

Add your answer
right arrow

Q150. Difference between session method and call transaction

Ans.

Session method and call transaction are two different ways of executing SAP transactions.

  • Session method executes a transaction in the same session as the calling program.

  • Call transaction executes a transaction in a separate session.

  • Session method is faster and more efficient as it does not require opening a new session.

  • Call transaction is useful when the transaction being executed has its own set of screens and requires user input.

  • Session method is used when the transaction b...read more

Add your answer
right arrow

Q151. How to find dynamic element in a page

Ans.

Dynamic elements can be found using various methods such as inspecting the page source code, using browser developer tools, or using automation tools.

  • Inspect the page source code to identify dynamic elements that have unique attributes or IDs

  • Use browser developer tools to inspect the page and identify dynamic elements that change based on user interactions

  • Use automation tools such as Selenium to locate dynamic elements by using wait conditions or element locators

  • Examples of d...read more

View 2 more answers
right arrow

Q152. How to switch a user ?

Ans.

To switch a user in Linux or Unix, use the 'su' command followed by the username.

  • Open the terminal

  • Type 'su' followed by the username of the user you want to switch to

  • Enter the password of the user when prompted

  • You will be switched to the specified user

View 1 answer
right arrow

Q153. What are different security patterns that can be implemented on soap and rest services?

Ans.

Security patterns for SOAP and REST services

  • Use HTTPS for secure communication

  • Implement authentication and authorization mechanisms

  • Use message encryption and decryption

  • Implement input validation and output encoding

  • Use rate limiting to prevent DoS attacks

  • Implement logging and monitoring for security incidents

  • Use OAuth for secure API access

  • Implement CORS to restrict access from unauthorized domains

Add your answer
right arrow

Q154. LinkedList implementation, Difference between double & single linkedlist on the basis of efficiency and implementation.

Ans.

Double linked list has pointers to both next and previous nodes, while single linked list only has pointer to next node.

  • Double linked list allows for traversal in both directions, while single linked list only allows traversal in one direction.

  • Insertions and deletions are more efficient in double linked list as compared to single linked list.

  • Double linked list requires more memory as compared to single linked list due to the additional pointer for previous node.

Add your answer
right arrow

Q155. 1) What are EV Project management concepts?

Ans.

EV Project management concepts refer to the principles and techniques used to manage projects related to electric vehicles.

  • EV project management involves planning, executing, and monitoring projects related to electric vehicles

  • It includes managing resources, timelines, budgets, and risks

  • EV project management also involves stakeholder management and communication

  • Examples of EV projects include building EV charging infrastructure, developing EV batteries, and designing EV vehic...read more

View 2 more answers
right arrow

Q156. What are the steps for LO cockpit dataSource enhancement?

Ans.

Steps for enhancing LO cockpit dataSource

  • Identify the fields to be added

  • Create append structure for the fields

  • Enhance the datasource with the append structure

  • Activate the datasource

  • Test the datasource

View 1 answer
right arrow

Q157. Who creats pr and how ?

Ans.

PR is created by the PR department or agency, in collaboration with the relevant stakeholders.

  • PR department or agency is responsible for creating PR

  • Collaboration with relevant stakeholders is necessary

  • PR creation involves identifying target audience, crafting key messages, and selecting appropriate channels

  • PR can be created for various purposes such as brand awareness, crisis management, product launches, etc.

Add your answer
right arrow

Q158. sample codes in automation using selenium webdriver, maven , git, jenkins

Ans.

Sample codes for automation using Selenium WebDriver, Maven, Git, Jenkins

  • Selenium WebDriver: driver.findElement(By.id("elementID")).sendKeys("text")

  • Maven: mvn clean install

  • Git: git clone https://github.com/username/repository.git

  • Jenkins: create a new job and configure it to run the automation tests

Add your answer
right arrow

Q159. How many host will be in /29?

Ans.

A /29 subnet has 6 usable host addresses.

  • A /29 subnet has a subnet mask of 255.255.255.248.

  • The subnet mask leaves 3 bits for host addresses.

  • 2^3 = 8, but 2 addresses are reserved for network and broadcast.

  • Therefore, a /29 subnet has 6 usable host addresses.

View 4 more answers
right arrow

Q160. How many run level are in Saloris and Linux

Ans.

Saloris does not exist. Linux has 7 run levels.

  • Saloris is not a known operating system

  • Linux has 7 run levels numbered from 0 to 6

  • Each run level has a specific set of services and daemons that are started or stopped

  • Run level 0 is used for system halt

  • Run level 1 is used for single user mode

  • Run level 2 is used for multi-user mode without networking

  • Run level 3 is used for multi-user mode with networking

  • Run level 4 is not used by default but can be customized

  • Run level 5 is used fo...read more

Add your answer
right arrow

Q161. How do you approach a documentation requirement?

Ans.

I approach a documentation requirement by first understanding the audience, gathering necessary information, organizing content logically, and ensuring clarity and accuracy.

  • Understand the target audience and their needs

  • Gather all necessary information from subject matter experts

  • Organize the content in a logical and easy-to-follow manner

  • Ensure clarity and accuracy in the documentation

  • Review and revise the documentation as needed

Add your answer
right arrow

Q162. Q2. What is a Gateway and full Explanation. Ans. Gateway is a hardware device that is used to connect two dissimilar type of network. It allows us to send and receive data through the internet event it is LAN n...

read more
Ans.

A gateway is a hardware device that connects two dissimilar types of networks, allowing data to be sent and received through the internet even if it is a LAN network.

  • Gateway acts as an entry and exit point for data traffic between networks

  • It translates data between different network protocols

  • Examples include routers and firewalls that connect a local network to the internet

Add your answer
right arrow

Q163. What are the most widely used languages for web design

Ans.

The most widely used languages for web design are HTML, CSS, and JavaScript.

  • HTML is used for creating the structure of a webpage

  • CSS is used for styling the webpage and making it visually appealing

  • JavaScript is used for adding interactivity and dynamic elements to the webpage

View 1 answer
right arrow

Q164. How many development tools have you used?

Ans.

I have used a variety of development tools throughout my career, including programming languages, data visualization tools, and statistical software.

  • Programming languages (e.g. Python, R, SQL)

  • Data visualization tools (e.g. Tableau, Power BI)

  • Statistical software (e.g. SPSS, SAS)

  • ETL tools (e.g. Informatica, Talend)

Add your answer
right arrow

Q165. What is the difference between domain and work group?

Ans.

Domain is a centralized network where a server controls access and security. Workgroup is a decentralized network where each computer has its own security settings.

  • Domain is a centralized network where a server controls access and security.

  • Workgroup is a decentralized network where each computer has its own security settings.

  • Domain is used in larger organizations with many users and computers.

  • Workgroup is used in smaller organizations with fewer users and computers.

  • Domain all...read more

Add your answer
right arrow

Q166. How can you can analyse ur responsibilities as a Business Analyst.

Ans.

As a Business Analyst, I can analyze my responsibilities by identifying key stakeholders, gathering requirements, and creating solutions.

  • Identify key stakeholders and their needs

  • Gather and document requirements

  • Analyze data and create solutions

  • Collaborate with cross-functional teams

  • Ensure project goals are met

  • Continuously improve processes

  • Communicate effectively with stakeholders

Add your answer
right arrow

Q167. What is the basic difference between SAP ECC and SAP S/4 HANA

Ans.

SAP ECC is the previous generation ERP system, while SAP S/4 HANA is the latest version that runs on the HANA database.

  • SAP ECC is based on traditional row-based database technology, while SAP S/4 HANA utilizes in-memory computing with the HANA database.

  • SAP S/4 HANA offers real-time analytics and reporting capabilities, whereas SAP ECC requires separate data warehousing and reporting solutions.

  • SAP S/4 HANA simplifies the data model and eliminates redundant data storage, result...read more

View 1 answer
right arrow

Q168. How to replace a disk from pool ?

Ans.

To replace a disk from a pool, you need to remove the faulty disk and add a new disk to the pool.

  • Identify the faulty disk using disk monitoring tools or error messages

  • Remove the faulty disk from the pool using the appropriate command or tool

  • Physically replace the faulty disk with a new disk

  • Add the new disk to the pool using the appropriate command or tool

  • Verify the disk replacement and ensure data integrity

View 1 answer
right arrow

Q169. How can we check all disk information ?

Ans.

To check all disk information in Linux and Unix systems, you can use the 'df' command.

  • Use the 'df' command to display disk space usage information

  • Add the '-h' option to display sizes in a more human-readable format

  • Use the '-T' option to display the filesystem type

  • Use the '-i' option to display inode information

  • Combine options as needed to get the desired output

View 1 answer
right arrow

Q170. What kind of techniques that applies in industry ?

Add your answer
right arrow

Q171. what are 8-bit and 16-bit processors, what is the difference ?

Add your answer
right arrow

Q172. How Apache Kafka can be used to across multiple producers and consumers across Kafka cluster ?

Ans.

Apache Kafka can be used to enable communication between multiple producers and consumers across a Kafka cluster.

  • Producers can publish messages to specific topics in the Kafka cluster.

  • Consumers can subscribe to these topics and receive messages in real-time.

  • Kafka ensures fault tolerance and scalability by distributing data partitions across multiple brokers.

  • Producers and consumers can be distributed across different nodes in the Kafka cluster for load balancing.

  • Kafka's distri...read more

Add your answer
right arrow

Q173. Types of network?

Ans.

There are several types of networks, including LAN, WAN, MAN, WLAN, and PAN.

  • Local Area Network (LAN) is a network that covers a small area, such as an office or a building.

  • Wide Area Network (WAN) is a network that covers a large geographical area, such as multiple cities or countries.

  • Metropolitan Area Network (MAN) is a network that covers a larger area than a LAN but smaller than a WAN, typically within a city.

  • Wireless Local Area Network (WLAN) is a LAN that uses wireless co...read more

View 4 more answers
right arrow

Q174. Q4 KPI and SLA/TAT? Q5 PTP Cycle? Q6 SOP/DTP? Q7 senerio questions? Q8 Accounting questions - golden rules, types of accounts, journal entries, depreciation etc) Q9 80*20 Principle?

Ans.

The interview questions cover KPIs, PTP cycle, SOP/DTP, scenario questions, accounting principles, and the 80/20 principle.

  • Q4: Discuss key performance indicators and service level agreements/turnaround times.

  • Q5: Explain the procure-to-pay cycle.

  • Q6: Describe standard operating procedures and document-to-process mapping.

  • Q7: Answer scenario-based questions related to financial analysis.

  • Q8: Discuss accounting principles such as the golden rules, types of accounts, journal entries...read more

Add your answer
right arrow

Q175. List out all the steps that are needed to be followed in order to switch Chrome settings to default.

Ans.

To switch Chrome settings to default, follow these steps.

  • Open Chrome settings

  • Scroll down and click on 'Advanced'

  • Scroll down further and click on 'Reset settings'

  • Confirm the reset by clicking on 'Reset' button

Add your answer
right arrow

Q176. How do you negotiate with OEM.?

Ans.

Negotiate with OEM by understanding their needs, building relationships, and finding win-win solutions.

  • Research the OEM's business and industry to understand their needs and priorities

  • Build a relationship with the OEM based on trust and mutual respect

  • Identify areas of common interest and work towards win-win solutions

  • Be prepared to compromise and find creative solutions to overcome obstacles

  • Communicate clearly and effectively throughout the negotiation process

  • Consider the lon...read more

Add your answer
right arrow

Q177. Cyclomatic Complexity in Salesforce

Ans.

Cyclomatic Complexity is a software metric that measures the complexity of a program based on its control flow.

  • Cyclomatic Complexity is calculated by counting the number of decision points in a program.

  • It helps in identifying complex code that may be difficult to understand, test, and maintain.

  • Higher Cyclomatic Complexity indicates higher risk and potential for bugs.

  • Reducing Cyclomatic Complexity can improve code quality and maintainability.

  • Salesforce provides tools like PMD ...read more

View 3 more answers
right arrow

Q178. What is one of the challenges faced and how was it resolved?

Ans.

One challenge faced was integrating legacy systems with SAP, resolved through thorough analysis and custom development.

  • Identified the key requirements for integration

  • Conducted a detailed analysis of the legacy systems and SAP functionalities

  • Developed custom interfaces and data migration tools

  • Tested the integration thoroughly to ensure data accuracy and system stability

Add your answer
right arrow

Q179. What is network and how many type are ther?

Ans.

A network is a group of interconnected devices that communicate with each other. There are three types of networks: LAN, WAN, and MAN.

  • A LAN (Local Area Network) is a network that covers a small area, like a home or office.

  • A WAN (Wide Area Network) is a network that covers a large area, like a city or country.

  • A MAN (Metropolitan Area Network) is a network that covers a larger area than a LAN but smaller than a WAN, like a city.

  • Other types of networks include WLAN (Wireless Loc...read more

Add your answer
right arrow

Q180. 3.How to make a class immutable

Ans.

To make a class immutable, we need to ensure that its state cannot be modified after creation.

  • Make all fields private and final

  • Do not provide any setters

  • If mutable objects are used, return copies instead of references

  • Ensure that any methods that modify state return a new instance instead of modifying the existing one

Add your answer
right arrow

Q181. Define the diagrams most used by business analysts?

Ans.

The most used diagrams by business analysts are use case diagrams, activity diagrams, and sequence diagrams.

  • Use case diagrams show the interactions between actors and the system.

  • Activity diagrams show the flow of activities within a process.

  • Sequence diagrams show the interactions between objects in a system.

  • Other diagrams used by business analysts include class diagrams, state diagrams, and ER diagrams.

  • These diagrams help to visualize and communicate complex business processe...read more

View 1 answer
right arrow

Q182. Pre-requisite for IDoc config at ECC and PO end?

Ans.

The pre-requisite for IDoc config at ECC and PO end is to have the necessary RFC destinations and ports configured.

  • RFC destinations must be created in both ECC and PO systems

  • Ports must be configured in both systems

  • Partner profiles must be maintained in both systems

  • IDoc types and message types must be defined and linked to the appropriate RFC destinations and ports

  • The necessary authorizations must be assigned to the user performing the configuration

Add your answer
right arrow

Q183. Do you have any idea on documentation or process designing work?

Ans.

Yes, I have experience in documentation and process designing work.

  • I have experience creating process flow diagrams, standard operating procedures, and training materials.

  • I am proficient in using tools such as Microsoft Visio, Lucidchart, and Google Docs for documentation.

  • I have worked on documenting business processes for various clients to improve efficiency and effectiveness.

  • I have also conducted process mapping sessions with stakeholders to identify bottlenecks and areas ...read more

Add your answer
right arrow

Q184. What are the different domains of SCM you have come across?

Ans.

The different domains of Supply Chain Management (SCM) include procurement, production planning, inventory management, logistics, and distribution.

  • Procurement: Involves sourcing raw materials or components needed for production.

  • Production Planning: Focuses on scheduling production processes to meet demand.

  • Inventory Management: Involves monitoring and controlling the flow of goods in and out of the organization.

  • Logistics: Deals with the transportation and storage of goods.

  • Dist...read more

Add your answer
right arrow

Q185. What are the different software you have used in past to manager the SCM?

Ans.

I have used various SCM software including SAP, Oracle SCM Cloud, and JDA Software.

  • SAP

  • Oracle SCM Cloud

  • JDA Software

Add your answer
right arrow

Q186. what is the difference between nw9 and nw19 version?

Ans.

NW9 and NW19 are different versions of NetWorker software with varying features and capabilities.

  • NW19 has improved backup and recovery performance compared to NW9.

  • NW19 supports more operating systems and applications than NW9.

  • NW19 has enhanced security features such as TLS 1.2 support.

  • NW19 has a new web-based user interface for easier management.

  • NW19 has a new feature called CloudBoost for cloud-based data protection.

  • NW9 is an older version and may not be supported by newer h...read more

View 1 answer
right arrow

Q187. How does a system call actually work?

Ans.

A system call is a request made by a program to the operating system for a service or resource.

  • A program executes a system call instruction.

  • The CPU switches to kernel mode and transfers control to the operating system.

  • The operating system performs the requested service or provides the requested resource.

  • The operating system returns control to the program by switching back to user mode.

  • Examples of system calls include open(), read(), write(), and close().

Add your answer
right arrow

Q188. How can you handle Client Requirements and What is SRS?

Ans.

Handling client requirements involves understanding their needs and translating them into a Software Requirements Specification (SRS).

  • Listen actively to the client's needs and ask clarifying questions

  • Document the requirements in a clear and concise manner

  • Ensure that the requirements are feasible and align with the project goals

  • Collaborate with the development team to ensure that the requirements are implemented correctly

  • Regularly communicate with the client to ensure that the...read more

Add your answer
right arrow

Q189. Have you ever done a HANA Database Refresh?

Ans.

Yes, I have experience in performing HANA database refresh.

  • I have performed HANA database refresh for various clients during my tenure as a SAP Basis consultant.

  • I am well-versed with the process of taking a backup of the source database and restoring it on the target system.

  • I have also worked on post-refresh activities such as updating system configurations and performing system checks to ensure data consistency.

  • One of the recent examples of my work includes performing a HANA...read more

Add your answer
right arrow

Q190. Write a program for finding postion of 'r' in program

Ans.

Program to find position of 'r' in a given string

  • Use a loop to iterate through each character in the string

  • Check if the current character is 'r'

  • If it is, return the index of that character

  • If 'r' is not found, return -1

Add your answer
right arrow

Q191. How we check all zpool status ?

Ans.

To check all zpool status, use the 'zpool status' command.

  • Open the terminal or command prompt.

  • Type 'zpool status' and press Enter.

  • The command will display the status of all zpools on the system.

  • You can also use additional options like '-v' for more detailed information.

View 1 answer
right arrow

Q192. Briefly describe the architectural methods followed to prepare a feasible solution for any client's requirements?

Ans.

Architectural methods involve understanding client requirements, analyzing site conditions, creating design concepts, and refining the solution.

  • Understand client's needs and preferences

  • Analyze site conditions and constraints

  • Create design concepts and present to client

  • Refine the solution based on feedback

  • Consider budget and timeline constraints

  • Collaborate with engineers and contractors

  • Ensure compliance with building codes and regulations

Add your answer
right arrow

Q193. 1. Mention your previous projects. 2. Difference between static and non static in main method. 3. What are synchronous and asynchronous services in sterling oms?

Ans.

Previous projects include implementing Sterling OMS, difference between static and non-static in main method, and understanding synchronous and asynchronous services in Sterling OMS.

  • Implemented Sterling OMS for a retail client to streamline order management processes

  • Static in main method means the method can be called without creating an instance of the class, while non-static requires an instance

  • Synchronous services in Sterling OMS are executed in a sequential order, while a...read more

Add your answer
right arrow

Q194. Any knowledge on windows servers, what do you know about patching windows, types of servers you know.

Ans.

I have knowledge on patching Windows servers and different types of servers.

  • I am familiar with the process of patching Windows servers to ensure they are up to date with the latest security updates and bug fixes.

  • I am aware of different types of Windows servers such as file servers, web servers, domain controllers, and application servers.

  • I understand the importance of regularly patching servers to protect against vulnerabilities and ensure optimal performance.

Add your answer
right arrow

Q195. Ways of data passing from one view controller to another view controller?

Ans.

Data passing between view controllers can be done using properties, delegates, notifications, segues, or user defaults.

  • Use properties to directly pass data between view controllers

  • Implement delegates to establish communication between view controllers

  • Post notifications to broadcast data to multiple view controllers

  • Pass data through segues when transitioning between view controllers

  • Store data in user defaults for persistent data sharing

Add your answer
right arrow

Q196. How much confident I have to work in S4 HANA implementation project in configuration level.

Ans.

I am highly confident in working on S4 HANA implementation projects at the configuration level.

  • I have extensive experience in SAP SD configuration and have successfully completed multiple implementation projects.

  • I have undergone training specifically for S4 HANA and have hands-on experience with the system.

  • I am familiar with the new features and functionalities of S4 HANA and can effectively configure them to meet business requirements.

Add your answer
right arrow

Q197. Difference between finance and accounts, What is Ledger creation, Cash flow and fund flow,What was your last company work What is GST and taxation

Ans.

Finance and accounts are related but distinct fields. Ledger creation is the process of recording financial transactions. Cash flow and fund flow are tools used to analyze the movement of money in a business. GST is a tax system in India.

  • Finance deals with the management of money and investments, while accounts focus on recording and analyzing financial transactions.

  • Ledger creation involves setting up accounts to record financial transactions, such as sales, purchases, and ex...read more

View 1 answer
right arrow

Q198. What is the difference between share point and one drive?

Ans.

SharePoint is a collaboration platform while OneDrive is a personal cloud storage service.

  • SharePoint is used for team collaboration and document management.

  • OneDrive is used for personal file storage and sharing.

  • SharePoint allows multiple users to work on the same document simultaneously.

  • OneDrive allows users to access their files from anywhere with an internet connection.

  • SharePoint is typically used by organizations while OneDrive is used by individuals.

  • SharePoint offers more...read more

Add your answer
right arrow

Q199. 1.How will you address the customer

Ans.

I will address the customer with respect and empathy, actively listening to their concerns and providing clear and concise solutions.

  • Greet the customer with a friendly and professional tone

  • Listen actively to their concerns and ask clarifying questions

  • Provide clear and concise solutions to their technical issues

  • Empathize with their frustration and offer reassurance

  • Thank them for their patience and for choosing our company

View 2 more answers
right arrow

Q200. what is difference between union vs union all

Ans.

Union combines and removes duplicates, Union All combines all rows including duplicates.

  • Union merges two tables and removes duplicates

  • Union All merges two tables and includes duplicates

  • Union is slower than Union All as it removes duplicates

  • Syntax: SELECT column1, column2 FROM table1 UNION/UNION ALL SELECT column1, column2 FROM table2

  • Example: SELECT name FROM table1 UNION SELECT name FROM table2

View 1 answer
right arrow
Previous
1
2
3
4
5
6
7
Next

More about working at IBM

Back
Awards Leaf
AmbitionBox Logo
Top Rated Mega Company - 2024
Awards Leaf
Awards Leaf
AmbitionBox Logo
Top Rated Company for Women - 2024
Awards Leaf
Awards Leaf
AmbitionBox Logo
Top Rated IT/ITES Company - 2024
Awards Leaf
Contribute & help others!
Write a review
Write a review
Share interview
Share interview
Contribute salary
Contribute salary
Add office photos
Add office photos

Interview Process at IBM

based on 1.8k interviews
Interview experience
4.2
Good
View more
interview tips and stories logo
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

Mphasis Logo
3.4
 • 520 Interview Questions
NTT Data Logo
3.9
 • 348 Interview Questions
WNS Logo
3.4
 • 282 Interview Questions
Schneider Electric Logo
4.1
 • 212 Interview Questions
Cummins Logo
4.3
 • 191 Interview Questions
ABB Logo
4.1
 • 161 Interview Questions
View all
Recently Viewed
REVIEWS
Infosys
Lead
4.3
(8 reviews)
SALARIES
Infosys
Lead
L/yr
(167 salaries)
JOBS
Infosys
Lead
63 jobs
JOBS
Genpact
jodhpur
No Jobs
DESIGNATION
INTERVIEWS
Amazon
No Interviews
JOBS
Tata Capital
No Jobs
JOBS
Aptech Academy
No Jobs
JOBS
HNM Sourcing
No Jobs
JOBS
JC Batteries
No Jobs
Top IBM Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
play-icon
play-icon
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter