
IBM


1000+ IBM Interview Questions and Answers
Q101. Can we modify user password and name ?
Yes, as a Linux and Unix System Administrator, you can modify user passwords and names.
To modify a user's password, you can use the 'passwd' command followed by the username.
To modify a user's name, you can use the 'usermod' command followed by the username and the '-l' option to change the login name.
Make sure to have the necessary permissions to modify user information.
Q102. Explain in detail the architecture , real time use case of containers and how do we manage or orchestrate them. explain dockerfile commands, docker-compose, kubernetes yaml file contents, kubernetes deployment.
Containers are lightweight, portable, and isolated environments that package applications and their dependencies.
Containers are instances of images that include the application and all its dependencies, allowing for easy deployment and scaling.
Docker is a popular containerization platform that uses Dockerfiles to define the image build process.
Docker-compose is a tool for defining and running multi-container Docker applications.
Kubernetes is a container orchestration platform...read more
Q103. What will happen if I won't maintain account modifier?
Not maintaining account modifier can lead to incorrect financial reporting and accounting errors.
Account modifier is used to differentiate between different types of transactions in financial reporting.
If not maintained, it can lead to incorrect financial statements and accounting errors.
For example, if a company has multiple revenue streams, not maintaining account modifier can lead to revenue from different streams being reported together, leading to incorrect financial ana...read more
Q104. Name the service which is required for time sync and how to configure it?
The service required for time sync is Network Time Protocol (NTP).
NTP is a protocol used to synchronize the clocks of computers over a network.
It ensures accurate timekeeping and consistency across systems.
To configure NTP, the administrator needs to specify NTP servers in the system's configuration file.
Examples of NTP servers are time.google.com, pool.ntp.org, etc.
The system periodically queries the NTP servers to adjust its clock accordingly.
Q105. When to use and not to use NoSQL databases such as Redis, Cassandra and MongoDB.
NoSQL databases like Redis, Cassandra, and MongoDB should be used when dealing with large amounts of unstructured data.
Use NoSQL databases when dealing with large amounts of unstructured data
Use NoSQL databases when scalability is a concern
Use NoSQL databases when flexibility is needed
Do not use NoSQL databases when dealing with structured data
Do not use NoSQL databases when ACID compliance is required
Q106. Have you heard about the Hybrid cloud?
Yes, Hybrid cloud is a combination of public and private cloud infrastructure.
Hybrid cloud allows organizations to leverage the benefits of both public and private cloud infrastructure.
It provides flexibility, scalability, and cost-effectiveness.
For example, an organization can use a public cloud for non-sensitive data and a private cloud for sensitive data.
Hybrid cloud also allows for workload portability and disaster recovery options.
It requires proper planning and manageme...read more
Q107. what is lan, network provider, speak on any topic for 5 min
LAN is a local area network that connects devices within a limited area. Network providers offer internet services to customers.
LAN is a computer network that covers a small geographic area, such as a home, office, or building.
It allows devices to communicate with each other and share resources like printers and files.
Network providers offer internet services to customers, such as cable, DSL, or fiber optic connections.
They provide the infrastructure and technology necessary ...read more
Q108. What is a role of support engineer
A support engineer is responsible for providing technical assistance and resolving issues related to software or hardware systems.
Providing technical support to customers or end-users
Troubleshooting and resolving software or hardware issues
Installing, configuring, and maintaining systems
Monitoring system performance and identifying potential problems
Collaborating with development teams to address bugs or enhancements
Documenting support processes and creating knowledge base ar...read more
Q109. What is the HANA Performance Improvement that you have done?
Implemented HANA table partitioning and index optimization resulting in 50% faster query performance.
Implemented table partitioning based on frequently accessed data
Optimized indexes to reduce data retrieval time
Tuned HANA parameters for better memory allocation
Reduced data footprint by archiving historical data
Implemented data compression to reduce storage requirements
Q110. what are the optimization techniques used in your project
Optimization techniques used in project
Caching
Parallel processing
Compression
Indexing
Query optimization
Q111. What is the range of private ip address?
The range of private IP addresses is defined by three blocks: 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255.
Private IP addresses are used within private networks and are not routable on the internet.
The three blocks of private IP addresses are reserved for use in local area networks (LANs) and are not unique globally.
Private IP addresses allow organizations to have multiple devices with the same IP addresses within their private ...read more
Q112. How do you monitor your application and what are the configurations?
Application monitoring is done through various tools and configurations.
We use tools like Nagios, Zabbix, and Prometheus for monitoring.
We configure alerts for critical events and set up dashboards for easy visualization.
We also use log aggregation tools like ELK stack to monitor application logs.
We monitor system resources like CPU, memory, and disk usage.
We perform load testing to identify performance bottlenecks.
We use APM tools like New Relic and AppDynamics to monitor ap...read more
Q113. Replace a sub-string in a string.
To replace a sub-string in a string, use the replace() method.
Use the replace() method with the old sub-string and new sub-string as arguments.
The replace() method only replaces the first occurrence of the sub-string by default.
To replace all occurrences, use a regular expression with the global flag.
Example: 'hello world'.replace('world', 'universe') returns 'hello universe'.
Example: 'hello world'.replace(/world/g, 'universe') returns 'hello universe'.
Q114. What is purchase requestition ?
A purchase requisition is a document used to request goods or services from a supplier.
It is a formal request for procurement of goods or services.
It includes details such as quantity, description, and estimated cost.
It is typically initiated by a department or individual within an organization.
It is used to obtain approval for the purchase before it is made.
It is an important part of the procurement process.
Example: A department within a company needs to purchase new compute...read more
Q115. Tell all process of patch management by stepwise ?
Patch management process involves identifying, testing, deploying, and verifying patches.
Identify vulnerabilities and available patches
Test patches in a non-production environment
Deploy patches to production systems
Verify successful patch installation and functionality
Monitor for any issues or new vulnerabilities
Repeat the process regularly
Use automation tools for efficiency
Q116. Difference between final, finalize and finally ?
final, finalize and finally are three different keywords in Java with different meanings.
final is a keyword used to declare a constant variable.
finalize is a method used for garbage collection.
finally is a block used in exception handling to execute code regardless of whether an exception is thrown or not.
final and finally are not related in any way.
Q117. soc 7 abend how to find ? resolve it ?
S0C7 abend is a mainframe error caused by invalid data. It can be resolved by identifying the source of the error and correcting it.
S0C7 abend is caused by invalid data in a numeric field
To resolve it, identify the source of the error and correct it
Common causes include incorrect data types, invalid characters, and overflow
Debugging tools like IBM Debug Tool can help identify the source of the error
Q118. 1. Why we go for microservice architecture 2. What is circuit breaker 3. What is service discovery 4.disadvantages of microservice 5. Disadvantage of stream api 6. Why we need default methods in functional inte...
read moreAnswers to questions related to microservice architecture, circuit breaker, service discovery, disadvantages of microservice, disadvantage of stream API, and default methods in functional interface.
Microservice architecture allows for scalability, flexibility, and easier maintenance of complex systems.
Circuit breaker is a design pattern used to prevent cascading failures in distributed systems.
Service discovery is the process of automatically detecting and locating services i...read more
Q119. Wat is a network printer and it's functions
A network printer is a printer that is connected to a computer network and can be accessed by multiple users.
A network printer allows multiple users to print documents from different devices connected to the same network.
It eliminates the need for individual printers for each user or device.
Network printers can be wired or wireless, depending on the network setup.
They often have additional features like scanning, copying, and faxing capabilities.
Network printers can be manage...read more
Q120. What is protocols ? what's difference between protocol & closure ?
Protocols are a set of rules or guidelines for communication between different objects. Closures are blocks of code that can be passed around and executed later.
Protocols define a blueprint of methods, properties, and other requirements that a class or structure must implement.
Closures capture and store references to any constants and variables from the context in which they are defined.
Protocols are used to define a set of methods that can be implemented by any class, struct...read more
Q121. 2) Difference between partitioning and Bucketing
Partitioning is dividing data into smaller chunks based on a column value. Bucketing is dividing data into equal-sized buckets based on a hash function.
Partitioning is used for organizing data for efficient querying and processing.
Bucketing is used for evenly distributing data across nodes in a cluster.
Partitioning is done based on a column value, such as date or region.
Bucketing is done based on a hash function, such as MD5 or SHA-1.
Partitioning can improve query performance...read more
Q122. What is the Docker? what is the best practice of writing a docker file?
Docker is a containerization platform that allows developers to package and deploy applications in a portable manner.
Dockerfile is a script that contains instructions to build a Docker image
Best practices include keeping the image size small, using a single process per container, and using environment variables for configuration
Use multi-stage builds to reduce image size and improve security
Avoid running containers as root to minimize security risks
Regularly update base image...read more
Q123. How will respond when you are the only one available on weekend , whenever there are client pings or user pings
I will prioritize urgent client or user pings and respond promptly to address their needs.
Prioritize urgent client or user pings over non-urgent ones
Respond promptly to address their needs
Communicate with the client or user to understand the issue and provide assistance
Document the issue and resolution for future reference
Q124. What skills do you think a web designer is required to have
A web designer is required to have skills in graphic design, coding, user experience, and communication.
Proficiency in graphic design software such as Adobe Photoshop and Illustrator
Strong coding skills in HTML, CSS, and JavaScript
Understanding of user experience principles and best practices
Effective communication skills to collaborate with clients and team members
Q125. How to validate the po ?
To validate a PO, check for accuracy, completeness, and compliance with procurement policies.
Verify that the PO number matches the one in the system
Ensure that the vendor information is correct
Check that the items ordered match the specifications and quantities requested
Confirm that the prices are accurate and in line with the budget
Ensure that the PO is authorized and approved by the appropriate personnel
Check that the delivery date and location are correct
Verify that the te...read more
Q126. DeadLockAsked to write code to insert a node in its correct location, given a sorted linked list.Asked to find least common ancestor given two nodes and the root; given a BST
Insert a node in correct location in a sorted linked list and find least common ancestor in a BST.
For inserting a node in a sorted linked list, traverse the list while comparing node values and insert the new node in its correct position.
For finding the least common ancestor in a BST, start from the root and traverse down the tree while comparing node values with the given nodes.
Q127. Router components service angular performance optimization how to scale app, security
Optimizing Angular app performance and security with router components and services
Use lazy loading to improve performance
Implement caching for frequently accessed data
Use Angular Universal for server-side rendering
Implement HTTPS and secure authentication for security
Use guards and interceptors to protect routes and prevent unauthorized access
Q128. waterfall model in software development life cycle
Waterfall model is a linear sequential approach to software development.
It follows a sequential flow from requirements gathering to testing and maintenance.
Each phase must be completed before moving on to the next.
Changes are difficult to implement once a phase is completed.
Suitable for projects with well-defined requirements and stable technology.
Examples include building a bridge or a physical product.
Q129. What is DNS,DHCP,IP address,RJ-45?
DNS is a system that translates domain names into IP addresses. DHCP is a protocol for assigning IP addresses. IP address is a unique identifier for devices. RJ-45 is a type of connector used for Ethernet cables.
DNS translates domain names (e.g., www.example.com) into IP addresses (e.g., 192.168.1.1).
DHCP is a protocol that automatically assigns IP addresses to devices on a network.
An IP address is a numerical label assigned to each device connected to a computer network.
RJ-4...read more
Q130. Difference between standard order and rush order? How the delivery is created immediately in rush order, where are the controls?
Standard orders have regular delivery times while rush orders require immediate delivery. Controls for rush orders are typically set in the system.
Standard orders have regular delivery times based on the company's standard processing and shipping times.
Rush orders are prioritized for immediate delivery, often with expedited processing and shipping.
Controls for rush orders are usually set in the system, such as flagging the order as a rush order or assigning it to a specific t...read more
Q131. How to check whether a file in empty or not using JCL.
Checking if a file is empty using JCL
Use the IDCAMS utility to check the file's status
Check the file's record count using the LISTCAT command
Use the SORT utility to check if the file has any records
Use the DFSORT utility to check if the file has any records
Q132. What is ip address , local user and roaming user , organization unit, Active director domain service, DNS, hyper-v
Explanation of IP address, local and roaming users, organization unit, Active Directory Domain Service, DNS, and Hyper-V.
IP address is a unique numerical identifier assigned to each device on a network.
Local user is a user account that is created on a specific device and can only be used on that device.
Roaming user is a user account that can be used on multiple devices within a network.
Organization unit is a container object in Active Directory used to organize and manage net...read more
Q133. What is meant by accounts payable?
Accounts payable refers to the amount of money a company owes to its suppliers or vendors for goods or services received.
Accounts payable is a liability on the balance sheet.
It represents the company's short-term obligations to pay for goods or services.
It includes invoices, bills, and other payment obligations.
Accounts payable is typically recorded when goods or services are received, but payment has not yet been made.
Examples of accounts payable include utility bills, inven...read more
Q134. How to activate Boot Environment back up ?
To activate Boot Environment back up, use the beadm command.
Use the beadm command with the activate option followed by the name of the Boot Environment.
For example, to activate the Boot Environment named 'BE1', use the command 'beadm activate BE1'.
This will make the Boot Environment the default one at the next system reboot.
Q135. What are the troubleshooting you will do when you are not able to connect to a server?
I will check network connectivity, firewall settings, and server status.
Check if the server is powered on and running
Verify network connectivity between the client and server
Check firewall settings to ensure the server is not blocked
Check if the server is reachable via ping or telnet
Check server logs for any errors or issues
Verify DNS settings are correct
Q136. 3) Difference between cache and persistent storage
Cache is temporary storage used to speed up access to frequently accessed data. Persistent storage is permanent storage used to store data even after power loss.
Cache is faster but smaller than persistent storage
Cache is volatile and data is lost when power is lost
Persistent storage is non-volatile and data is retained even after power loss
Examples of cache include CPU cache, browser cache, and CDN cache
Examples of persistent storage include hard disk drives, solid-state driv...read more
Q137. Explain in breif and adding real experience stories how to solve problems.
Problem-solving involves identifying, analyzing, and resolving issues to achieve desired outcomes.
Define the problem and gather information
Brainstorm potential solutions
Evaluate and select the best solution
Implement the solution and monitor its effectiveness
Adjust the solution as needed
Real experience story: During a project, we faced a challenge with a vendor who was not meeting our expectations. We defined the problem, gathered data, and brainstormed potential solutions. We...read more
Q138. What does Principal Component Analysis do?
Principal Component Analysis is a statistical technique used to reduce the dimensionality of a dataset while retaining important information.
PCA identifies the underlying structure in the data by finding the directions of maximum variance.
It transforms the data into a new coordinate system where the first axis has the highest variance, followed by the second, and so on.
The transformed data can be used for visualization, clustering, or classification.
PCA assumes that the data ...read more
Q139. What is code inspector , what is assistance class
Code Inspector is a tool to check code quality. Assistance class is a reusable class to provide common functionality.
Code Inspector checks for syntax errors, performance issues, security vulnerabilities, and adherence to coding standards.
Assistance class provides reusable code for common functionality like date and time calculations, string operations, and database access.
Assistance class can be used in multiple programs, reducing code duplication and improving maintainabilit...read more
Q140. What do you know of Agile Methodology and Scrum?
Agile Methodology and Scrum are popular project management frameworks used in software development.
Agile Methodology is a flexible approach to software development that emphasizes incremental delivery, collaboration, and continuous improvement.
Scrum is a specific Agile framework that divides work into sprints, with daily stand-up meetings and regular reviews.
Scrum roles include Product Owner, Scrum Master, and Development Team.
Scrum artifacts include Product Backlog, Sprint B...read more
Q141. Have you worked with any version control systems?
Yes, I have experience working with version control systems.
I have used Git for version control in my previous roles.
I am familiar with branching, merging, and resolving conflicts in Git.
I have also worked with SVN (Subversion) in the past.
Q142. diiferent types of joints? implementation of joints ? what is joints?
Joints are connections between bones that allow movement. There are different types of joints and their implementation varies.
Types of joints include hinge, ball-and-socket, pivot, saddle, and gliding joints.
Joints are implemented through the use of ligaments, tendons, and muscles.
Examples of joints include the knee joint, shoulder joint, and hip joint.
Joints can be affected by various conditions such as arthritis and injuries.
Proper care and exercise can help maintain health...read more
Q143. what all financial application you can work on?
I can work on various financial applications including accounting software, financial analysis tools, and investment management platforms.
Proficient in using accounting software such as QuickBooks and Xero
Skilled in financial analysis tools like Excel and Bloomberg Terminal
Familiar with investment management platforms such as E*TRADE and TD Ameritrade
Experience in using financial modeling software like MATLAB and R
Knowledgeable in using ERP systems like SAP and Oracle
Q144. How do you prepare of ledger posting
Ledger posting involves recording financial transactions in the appropriate accounts.
Identify the accounts affected by the transaction
Determine the type of account (asset, liability, equity, revenue, expense)
Debit or credit the appropriate account based on the transaction type
Record the transaction in the general ledger
Ensure accuracy and completeness of the posting
Q145. Explain the entire process of your DevOps project? what are the components of Kubernetes?
The DevOps project involves continuous integration, delivery, and deployment of software. Kubernetes components include pods, services, deployments, and namespaces.
The DevOps process starts with developers committing code to a version control system like Git.
The code is then built and tested using continuous integration tools like Jenkins.
The built code is packaged into containers using tools like Docker.
The containers are deployed to a Kubernetes cluster using tools like kub...read more
Q146. What is the DBMS and What is use of DBMS?
DBMS stands for Database Management System. It is used to manage and organize data in a structured manner.
DBMS is a software system that allows users to define, create, maintain and control access to databases.
It provides a way to store and retrieve data efficiently and effectively.
DBMS helps in maintaining data integrity, security and consistency.
Examples of DBMS include MySQL, Oracle, SQL Server, MongoDB, etc.
Q147. Which server and version is being used and how to configure the data source in WebLogic server
The server being used is WebLogic and the version is not specified. Data source can be configured through the console or configuration files.
WebLogic server is being used
Version is not specified
Data source can be configured through console or configuration files
Q148. How the process flow in Restful service
Restful service process flow involves client sending requests to server, which responds with data in a standardized format.
Client sends HTTP request to server
Server processes request and sends back HTTP response
Response is in a standardized format such as JSON or XML
Client can then use the response data as needed
Q149. What is cutting edge technology emerging in IT industry ?
Q150. Difference between session method and call transaction
Session method and call transaction are two different ways of executing SAP transactions.
Session method executes a transaction in the same session as the calling program.
Call transaction executes a transaction in a separate session.
Session method is faster and more efficient as it does not require opening a new session.
Call transaction is useful when the transaction being executed has its own set of screens and requires user input.
Session method is used when the transaction b...read more
Q151. How to find dynamic element in a page
Dynamic elements can be found using various methods such as inspecting the page source code, using browser developer tools, or using automation tools.
Inspect the page source code to identify dynamic elements that have unique attributes or IDs
Use browser developer tools to inspect the page and identify dynamic elements that change based on user interactions
Use automation tools such as Selenium to locate dynamic elements by using wait conditions or element locators
Examples of d...read more
Q152. How to switch a user ?
To switch a user in Linux or Unix, use the 'su' command followed by the username.
Open the terminal
Type 'su' followed by the username of the user you want to switch to
Enter the password of the user when prompted
You will be switched to the specified user
Q153. What are different security patterns that can be implemented on soap and rest services?
Security patterns for SOAP and REST services
Use HTTPS for secure communication
Implement authentication and authorization mechanisms
Use message encryption and decryption
Implement input validation and output encoding
Use rate limiting to prevent DoS attacks
Implement logging and monitoring for security incidents
Use OAuth for secure API access
Implement CORS to restrict access from unauthorized domains
Q154. LinkedList implementation, Difference between double & single linkedlist on the basis of efficiency and implementation.
Double linked list has pointers to both next and previous nodes, while single linked list only has pointer to next node.
Double linked list allows for traversal in both directions, while single linked list only allows traversal in one direction.
Insertions and deletions are more efficient in double linked list as compared to single linked list.
Double linked list requires more memory as compared to single linked list due to the additional pointer for previous node.
Q155. 1) What are EV Project management concepts?
EV Project management concepts refer to the principles and techniques used to manage projects related to electric vehicles.
EV project management involves planning, executing, and monitoring projects related to electric vehicles
It includes managing resources, timelines, budgets, and risks
EV project management also involves stakeholder management and communication
Examples of EV projects include building EV charging infrastructure, developing EV batteries, and designing EV vehic...read more
Q156. What are the steps for LO cockpit dataSource enhancement?
Steps for enhancing LO cockpit dataSource
Identify the fields to be added
Create append structure for the fields
Enhance the datasource with the append structure
Activate the datasource
Test the datasource
Q157. Who creats pr and how ?
PR is created by the PR department or agency, in collaboration with the relevant stakeholders.
PR department or agency is responsible for creating PR
Collaboration with relevant stakeholders is necessary
PR creation involves identifying target audience, crafting key messages, and selecting appropriate channels
PR can be created for various purposes such as brand awareness, crisis management, product launches, etc.
Q158. sample codes in automation using selenium webdriver, maven , git, jenkins
Sample codes for automation using Selenium WebDriver, Maven, Git, Jenkins
Selenium WebDriver: driver.findElement(By.id("elementID")).sendKeys("text")
Maven: mvn clean install
Git: git clone https://github.com/username/repository.git
Jenkins: create a new job and configure it to run the automation tests
Q159. How many host will be in /29?
A /29 subnet has 6 usable host addresses.
A /29 subnet has a subnet mask of 255.255.255.248.
The subnet mask leaves 3 bits for host addresses.
2^3 = 8, but 2 addresses are reserved for network and broadcast.
Therefore, a /29 subnet has 6 usable host addresses.
Q160. How many run level are in Saloris and Linux
Saloris does not exist. Linux has 7 run levels.
Saloris is not a known operating system
Linux has 7 run levels numbered from 0 to 6
Each run level has a specific set of services and daemons that are started or stopped
Run level 0 is used for system halt
Run level 1 is used for single user mode
Run level 2 is used for multi-user mode without networking
Run level 3 is used for multi-user mode with networking
Run level 4 is not used by default but can be customized
Run level 5 is used fo...read more
Q161. How do you approach a documentation requirement?
I approach a documentation requirement by first understanding the audience, gathering necessary information, organizing content logically, and ensuring clarity and accuracy.
Understand the target audience and their needs
Gather all necessary information from subject matter experts
Organize the content in a logical and easy-to-follow manner
Ensure clarity and accuracy in the documentation
Review and revise the documentation as needed
Q162. Q2. What is a Gateway and full Explanation. Ans. Gateway is a hardware device that is used to connect two dissimilar type of network. It allows us to send and receive data through the internet event it is LAN n...
read moreA gateway is a hardware device that connects two dissimilar types of networks, allowing data to be sent and received through the internet even if it is a LAN network.
Gateway acts as an entry and exit point for data traffic between networks
It translates data between different network protocols
Examples include routers and firewalls that connect a local network to the internet
Q163. What are the most widely used languages for web design
The most widely used languages for web design are HTML, CSS, and JavaScript.
HTML is used for creating the structure of a webpage
CSS is used for styling the webpage and making it visually appealing
JavaScript is used for adding interactivity and dynamic elements to the webpage
Q164. How many development tools have you used?
I have used a variety of development tools throughout my career, including programming languages, data visualization tools, and statistical software.
Programming languages (e.g. Python, R, SQL)
Data visualization tools (e.g. Tableau, Power BI)
Statistical software (e.g. SPSS, SAS)
ETL tools (e.g. Informatica, Talend)
Q165. What is the difference between domain and work group?
Domain is a centralized network where a server controls access and security. Workgroup is a decentralized network where each computer has its own security settings.
Domain is a centralized network where a server controls access and security.
Workgroup is a decentralized network where each computer has its own security settings.
Domain is used in larger organizations with many users and computers.
Workgroup is used in smaller organizations with fewer users and computers.
Domain all...read more
Q166. How can you can analyse ur responsibilities as a Business Analyst.
As a Business Analyst, I can analyze my responsibilities by identifying key stakeholders, gathering requirements, and creating solutions.
Identify key stakeholders and their needs
Gather and document requirements
Analyze data and create solutions
Collaborate with cross-functional teams
Ensure project goals are met
Continuously improve processes
Communicate effectively with stakeholders
Q167. What is the basic difference between SAP ECC and SAP S/4 HANA
SAP ECC is the previous generation ERP system, while SAP S/4 HANA is the latest version that runs on the HANA database.
SAP ECC is based on traditional row-based database technology, while SAP S/4 HANA utilizes in-memory computing with the HANA database.
SAP S/4 HANA offers real-time analytics and reporting capabilities, whereas SAP ECC requires separate data warehousing and reporting solutions.
SAP S/4 HANA simplifies the data model and eliminates redundant data storage, result...read more
Q168. How to replace a disk from pool ?
To replace a disk from a pool, you need to remove the faulty disk and add a new disk to the pool.
Identify the faulty disk using disk monitoring tools or error messages
Remove the faulty disk from the pool using the appropriate command or tool
Physically replace the faulty disk with a new disk
Add the new disk to the pool using the appropriate command or tool
Verify the disk replacement and ensure data integrity
Q169. How can we check all disk information ?
To check all disk information in Linux and Unix systems, you can use the 'df' command.
Use the 'df' command to display disk space usage information
Add the '-h' option to display sizes in a more human-readable format
Use the '-T' option to display the filesystem type
Use the '-i' option to display inode information
Combine options as needed to get the desired output
Q170. What kind of techniques that applies in industry ?
Q171. what are 8-bit and 16-bit processors, what is the difference ?
Q172. How Apache Kafka can be used to across multiple producers and consumers across Kafka cluster ?
Apache Kafka can be used to enable communication between multiple producers and consumers across a Kafka cluster.
Producers can publish messages to specific topics in the Kafka cluster.
Consumers can subscribe to these topics and receive messages in real-time.
Kafka ensures fault tolerance and scalability by distributing data partitions across multiple brokers.
Producers and consumers can be distributed across different nodes in the Kafka cluster for load balancing.
Kafka's distri...read more
Q173. Types of network?
There are several types of networks, including LAN, WAN, MAN, WLAN, and PAN.
Local Area Network (LAN) is a network that covers a small area, such as an office or a building.
Wide Area Network (WAN) is a network that covers a large geographical area, such as multiple cities or countries.
Metropolitan Area Network (MAN) is a network that covers a larger area than a LAN but smaller than a WAN, typically within a city.
Wireless Local Area Network (WLAN) is a LAN that uses wireless co...read more
Q174. Q4 KPI and SLA/TAT? Q5 PTP Cycle? Q6 SOP/DTP? Q7 senerio questions? Q8 Accounting questions - golden rules, types of accounts, journal entries, depreciation etc) Q9 80*20 Principle?
The interview questions cover KPIs, PTP cycle, SOP/DTP, scenario questions, accounting principles, and the 80/20 principle.
Q4: Discuss key performance indicators and service level agreements/turnaround times.
Q5: Explain the procure-to-pay cycle.
Q6: Describe standard operating procedures and document-to-process mapping.
Q7: Answer scenario-based questions related to financial analysis.
Q8: Discuss accounting principles such as the golden rules, types of accounts, journal entries...read more
Q175. List out all the steps that are needed to be followed in order to switch Chrome settings to default.
To switch Chrome settings to default, follow these steps.
Open Chrome settings
Scroll down and click on 'Advanced'
Scroll down further and click on 'Reset settings'
Confirm the reset by clicking on 'Reset' button
Q176. How do you negotiate with OEM.?
Negotiate with OEM by understanding their needs, building relationships, and finding win-win solutions.
Research the OEM's business and industry to understand their needs and priorities
Build a relationship with the OEM based on trust and mutual respect
Identify areas of common interest and work towards win-win solutions
Be prepared to compromise and find creative solutions to overcome obstacles
Communicate clearly and effectively throughout the negotiation process
Consider the lon...read more
Q177. Cyclomatic Complexity in Salesforce
Cyclomatic Complexity is a software metric that measures the complexity of a program based on its control flow.
Cyclomatic Complexity is calculated by counting the number of decision points in a program.
It helps in identifying complex code that may be difficult to understand, test, and maintain.
Higher Cyclomatic Complexity indicates higher risk and potential for bugs.
Reducing Cyclomatic Complexity can improve code quality and maintainability.
Salesforce provides tools like PMD ...read more
Q178. What is one of the challenges faced and how was it resolved?
One challenge faced was integrating legacy systems with SAP, resolved through thorough analysis and custom development.
Identified the key requirements for integration
Conducted a detailed analysis of the legacy systems and SAP functionalities
Developed custom interfaces and data migration tools
Tested the integration thoroughly to ensure data accuracy and system stability
Q179. What is network and how many type are ther?
A network is a group of interconnected devices that communicate with each other. There are three types of networks: LAN, WAN, and MAN.
A LAN (Local Area Network) is a network that covers a small area, like a home or office.
A WAN (Wide Area Network) is a network that covers a large area, like a city or country.
A MAN (Metropolitan Area Network) is a network that covers a larger area than a LAN but smaller than a WAN, like a city.
Other types of networks include WLAN (Wireless Loc...read more
Q180. 3.How to make a class immutable
To make a class immutable, we need to ensure that its state cannot be modified after creation.
Make all fields private and final
Do not provide any setters
If mutable objects are used, return copies instead of references
Ensure that any methods that modify state return a new instance instead of modifying the existing one
Q181. Define the diagrams most used by business analysts?
The most used diagrams by business analysts are use case diagrams, activity diagrams, and sequence diagrams.
Use case diagrams show the interactions between actors and the system.
Activity diagrams show the flow of activities within a process.
Sequence diagrams show the interactions between objects in a system.
Other diagrams used by business analysts include class diagrams, state diagrams, and ER diagrams.
These diagrams help to visualize and communicate complex business processe...read more
Q182. Pre-requisite for IDoc config at ECC and PO end?
The pre-requisite for IDoc config at ECC and PO end is to have the necessary RFC destinations and ports configured.
RFC destinations must be created in both ECC and PO systems
Ports must be configured in both systems
Partner profiles must be maintained in both systems
IDoc types and message types must be defined and linked to the appropriate RFC destinations and ports
The necessary authorizations must be assigned to the user performing the configuration
Q183. Do you have any idea on documentation or process designing work?
Yes, I have experience in documentation and process designing work.
I have experience creating process flow diagrams, standard operating procedures, and training materials.
I am proficient in using tools such as Microsoft Visio, Lucidchart, and Google Docs for documentation.
I have worked on documenting business processes for various clients to improve efficiency and effectiveness.
I have also conducted process mapping sessions with stakeholders to identify bottlenecks and areas ...read more
Q184. What are the different domains of SCM you have come across?
The different domains of Supply Chain Management (SCM) include procurement, production planning, inventory management, logistics, and distribution.
Procurement: Involves sourcing raw materials or components needed for production.
Production Planning: Focuses on scheduling production processes to meet demand.
Inventory Management: Involves monitoring and controlling the flow of goods in and out of the organization.
Logistics: Deals with the transportation and storage of goods.
Dist...read more
Q185. What are the different software you have used in past to manager the SCM?
I have used various SCM software including SAP, Oracle SCM Cloud, and JDA Software.
SAP
Oracle SCM Cloud
JDA Software
Q186. what is the difference between nw9 and nw19 version?
NW9 and NW19 are different versions of NetWorker software with varying features and capabilities.
NW19 has improved backup and recovery performance compared to NW9.
NW19 supports more operating systems and applications than NW9.
NW19 has enhanced security features such as TLS 1.2 support.
NW19 has a new web-based user interface for easier management.
NW19 has a new feature called CloudBoost for cloud-based data protection.
NW9 is an older version and may not be supported by newer h...read more
Q187. How does a system call actually work?
A system call is a request made by a program to the operating system for a service or resource.
A program executes a system call instruction.
The CPU switches to kernel mode and transfers control to the operating system.
The operating system performs the requested service or provides the requested resource.
The operating system returns control to the program by switching back to user mode.
Examples of system calls include open(), read(), write(), and close().
Q188. How can you handle Client Requirements and What is SRS?
Handling client requirements involves understanding their needs and translating them into a Software Requirements Specification (SRS).
Listen actively to the client's needs and ask clarifying questions
Document the requirements in a clear and concise manner
Ensure that the requirements are feasible and align with the project goals
Collaborate with the development team to ensure that the requirements are implemented correctly
Regularly communicate with the client to ensure that the...read more
Q189. Have you ever done a HANA Database Refresh?
Yes, I have experience in performing HANA database refresh.
I have performed HANA database refresh for various clients during my tenure as a SAP Basis consultant.
I am well-versed with the process of taking a backup of the source database and restoring it on the target system.
I have also worked on post-refresh activities such as updating system configurations and performing system checks to ensure data consistency.
One of the recent examples of my work includes performing a HANA...read more
Q190. Write a program for finding postion of 'r' in program
Program to find position of 'r' in a given string
Use a loop to iterate through each character in the string
Check if the current character is 'r'
If it is, return the index of that character
If 'r' is not found, return -1
Q191. How we check all zpool status ?
To check all zpool status, use the 'zpool status' command.
Open the terminal or command prompt.
Type 'zpool status' and press Enter.
The command will display the status of all zpools on the system.
You can also use additional options like '-v' for more detailed information.
Q192. Briefly describe the architectural methods followed to prepare a feasible solution for any client's requirements?
Architectural methods involve understanding client requirements, analyzing site conditions, creating design concepts, and refining the solution.
Understand client's needs and preferences
Analyze site conditions and constraints
Create design concepts and present to client
Refine the solution based on feedback
Consider budget and timeline constraints
Collaborate with engineers and contractors
Ensure compliance with building codes and regulations
Q193. 1. Mention your previous projects. 2. Difference between static and non static in main method. 3. What are synchronous and asynchronous services in sterling oms?
Previous projects include implementing Sterling OMS, difference between static and non-static in main method, and understanding synchronous and asynchronous services in Sterling OMS.
Implemented Sterling OMS for a retail client to streamline order management processes
Static in main method means the method can be called without creating an instance of the class, while non-static requires an instance
Synchronous services in Sterling OMS are executed in a sequential order, while a...read more
Q194. Any knowledge on windows servers, what do you know about patching windows, types of servers you know.
I have knowledge on patching Windows servers and different types of servers.
I am familiar with the process of patching Windows servers to ensure they are up to date with the latest security updates and bug fixes.
I am aware of different types of Windows servers such as file servers, web servers, domain controllers, and application servers.
I understand the importance of regularly patching servers to protect against vulnerabilities and ensure optimal performance.
Q195. Ways of data passing from one view controller to another view controller?
Data passing between view controllers can be done using properties, delegates, notifications, segues, or user defaults.
Use properties to directly pass data between view controllers
Implement delegates to establish communication between view controllers
Post notifications to broadcast data to multiple view controllers
Pass data through segues when transitioning between view controllers
Store data in user defaults for persistent data sharing
Q196. How much confident I have to work in S4 HANA implementation project in configuration level.
I am highly confident in working on S4 HANA implementation projects at the configuration level.
I have extensive experience in SAP SD configuration and have successfully completed multiple implementation projects.
I have undergone training specifically for S4 HANA and have hands-on experience with the system.
I am familiar with the new features and functionalities of S4 HANA and can effectively configure them to meet business requirements.
Q197. Difference between finance and accounts, What is Ledger creation, Cash flow and fund flow,What was your last company work What is GST and taxation
Finance and accounts are related but distinct fields. Ledger creation is the process of recording financial transactions. Cash flow and fund flow are tools used to analyze the movement of money in a business. GST is a tax system in India.
Finance deals with the management of money and investments, while accounts focus on recording and analyzing financial transactions.
Ledger creation involves setting up accounts to record financial transactions, such as sales, purchases, and ex...read more
Q198. What is the difference between share point and one drive?
SharePoint is a collaboration platform while OneDrive is a personal cloud storage service.
SharePoint is used for team collaboration and document management.
OneDrive is used for personal file storage and sharing.
SharePoint allows multiple users to work on the same document simultaneously.
OneDrive allows users to access their files from anywhere with an internet connection.
SharePoint is typically used by organizations while OneDrive is used by individuals.
SharePoint offers more...read more
Q199. 1.How will you address the customer
I will address the customer with respect and empathy, actively listening to their concerns and providing clear and concise solutions.
Greet the customer with a friendly and professional tone
Listen actively to their concerns and ask clarifying questions
Provide clear and concise solutions to their technical issues
Empathize with their frustration and offer reassurance
Thank them for their patience and for choosing our company
Q200. what is difference between union vs union all
Union combines and removes duplicates, Union All combines all rows including duplicates.
Union merges two tables and removes duplicates
Union All merges two tables and includes duplicates
Union is slower than Union All as it removes duplicates
Syntax: SELECT column1, column2 FROM table1 UNION/UNION ALL SELECT column1, column2 FROM table2
Example: SELECT name FROM table1 UNION SELECT name FROM table2
More about working at IBM










Top HR Questions asked in IBM
Interview Process at IBM

Top Interview Questions from Similar Companies








Reviews
Interviews
Salaries
Users/Month

