IBS Software Services
60+ Mu Sigma Interview Questions and Answers
Q1. There are 10 apples in my hand ,from these apples ,2 of them are much smaller than others .. what are the possibilities to take that smaller apples with easy method ;that means reduce the no of terms maximum .....
read moreThere are 10 apples in hand, 2 are smaller. How to easily identify them?
Look for any visible differences
Weigh the apples to find the lighter ones
Compare the size of each apple with a known size
Use a caliper to measure the size of each apple
Q2. How would you create the user stories for an app that tracks expenses?
To create user stories for an expense tracking app, consider the needs of different user roles and prioritize key features.
Identify user roles such as individual users, managers, and accountants
Prioritize features like capturing receipts, categorizing expenses, generating reports
Create user stories for each role and feature, e.g., 'As an individual user, I want to easily capture and categorize my expenses'
Include acceptance criteria for each user story, e.g., 'Expense should ...read more
Q3. How will you develop an application which shows all airports in the country in a map. User needs to login and report any incidents happened in a particular airport
Develop an app to show all airports in a country on a map and allow users to report incidents after logging in.
Use a map API like Google Maps or Mapbox to display all airports in the country
Implement a login system for users to report incidents
Create a form for users to report incidents with fields like airport name, incident type, and description
Store incident reports in a database for future reference and analysis
Q4. What Java class loaders?
Java class loaders are responsible for loading classes during runtime.
Java class loaders are responsible for loading classes during runtime.
There are three types of class loaders: Bootstrap, Extension, and System.
Custom class loaders can also be created to load classes from non-standard sources.
Class loaders follow a delegation model where they first check if a class has already been loaded before attempting to load it again.
Class loaders can also be used to enforce security ...read more
Q5. Accrued income and accrued expense under which head it is shown under balance sheet
Accrued income is shown under the asset side of the balance sheet, while accrued expenses are shown under the liability side.
Accrued income is recorded as a current asset on the balance sheet, representing revenue that has been earned but not yet received.
Accrued expenses are recorded as a current liability on the balance sheet, representing expenses that have been incurred but not yet paid.
Accrued income increases the total assets of the company, while accrued expenses incre...read more
Q6. What are the positives and negatives of microservice architecture
Microservice architecture offers flexibility and scalability but also adds complexity and requires careful management.
Positives: flexibility, scalability, fault isolation, independent deployment, technology diversity
Negatives: increased complexity, higher operational overhead, potential for communication issues, requires careful management
Example: Netflix uses microservices to handle millions of users and provide personalized recommendations
Example: Amazon's microservices arc...read more
Q7. Cloud technologies you are familiar with?
I am familiar with AWS, Azure, and Google Cloud Platform.
Experience with AWS services such as EC2, S3, Lambda, and RDS
Familiarity with Azure services like Virtual Machines, Blob Storage, and Functions
Knowledge of Google Cloud Platform services such as Compute Engine, Cloud Storage, and Cloud Functions
Q8. How to validate that the URL loaded is correct or not?
To validate the correct URL loaded, check the current URL in the browser.
Get the current URL from the browser using driver.getCurrentUrl() method in Selenium.
Compare the current URL with the expected URL to validate correctness.
Use assertions or conditional statements to confirm if the URL is correct.
Consider handling any redirects or dynamic URLs that may affect validation.
Utilize regular expressions for more flexible URL validation.
Q9. How the job is beneficial to job seekers who has applied for it ?
The job of a Business Analyst is beneficial for job seekers as it offers a challenging and rewarding career with opportunities for growth and development.
Provides exposure to various industries and domains
Opportunities to work with cross-functional teams
Develops analytical and problem-solving skills
Enhances communication and presentation skills
Offers competitive salaries and benefits
Potential for career advancement and leadership roles
Q10. Difference between IATA and airline and its relationship?
IATA is a trade association for airlines while airlines are companies that operate flights. They have a business relationship.
IATA stands for International Air Transport Association and is a trade association for airlines.
Airlines are companies that operate flights and provide air transportation services to passengers and cargo.
IATA sets standards and regulations for the airline industry and provides services to its members such as training and consulting.
Airlines are members...read more
Q11. How to implement spring security in spring boot application
Implementing Spring Security in a Spring Boot application involves configuring security settings and adding dependencies.
Add spring-boot-starter-security dependency in pom.xml
Create a class extending WebSecurityConfigurerAdapter to configure security settings
Use @EnableWebSecurity annotation to enable Spring Security
Define authentication and authorization rules in configure(HttpSecurity http) method
Q12. What is prepain income and prepaid expenses
Prepaid income is income received in advance, while prepaid expenses are expenses paid in advance.
Prepaid income is income received before it is earned, such as subscription fees paid in advance.
Prepaid expenses are expenses paid for in advance, like insurance premiums or rent.
Both prepaid income and prepaid expenses are recorded as assets on the balance sheet until they are earned or used.
Q13. What is going concern concept and matching concept
Going concern concept is the assumption that a company will continue to operate in the foreseeable future, while matching concept is the principle of matching expenses with revenues in the same accounting period.
Going concern concept assumes that a company will continue to operate for the foreseeable future without the need to liquidate assets or be forced out of business.
Matching concept states that expenses should be recognized in the same period as the revenues they help g...read more
Q14. Why should we go for inversion of control?
Inversion of control promotes loose coupling and modular design.
IoC allows for easier testing and maintenance.
It promotes separation of concerns and reduces code duplication.
IoC containers can manage object creation and dependencies.
Examples include Spring Framework, Unity, and Ninject.
Q15. Tds on purchase of land from an individual for ₹10000000
TDS on purchase of land from an individual for ₹10000000 is applicable.
TDS rate on purchase of land from an individual is 1% if the value exceeds ₹50 lakhs.
In this case, TDS amount would be ₹100000 (1% of ₹10000000).
The buyer is required to deduct TDS at the time of making payment to the seller.
TDS should be deposited with the government and TDS certificate should be issued to the seller.
Q16. What is the life cycle of cargo ?
Cargo life cycle involves various stages from production to delivery.
Production of goods
Packaging and labeling
Loading onto transportation
Transportation to destination
Unloading and storage
Customs clearance
Delivery to end customer
Q17. Tell me about Import and export operations
Import and export operations involve transferring data or files between different systems or formats.
Import operations involve bringing data or files into a system or application.
Export operations involve sending data or files out of a system or application.
Import and export operations are commonly used in software applications to transfer data between different formats or systems.
Examples of import and export operations include importing a CSV file into a database, exporting...read more
Q18. What are the scopes of a spring bean?
Scopes define the lifecycle of a Spring bean.
There are 5 scopes in Spring: Singleton, Prototype, Request, Session, and Global Session.
Singleton creates only one instance per Spring container.
Prototype creates a new instance every time it is requested.
Request creates a new instance for each HTTP request.
Session creates a new instance for each HTTP session.
Global Session creates a new instance for each global HTTP session.
Scopes can be defined using the @Scope annotation or in ...read more
Q19. Java Streams question to find the total number of employees that have salary greater than 50000
Use Java Streams to find total employees with salary > 50000
Filter employees with salary > 50000 using stream.filter()
Count the number of employees using stream.count()
Q20. Count occurences of words in a string
Count the occurrences of words in a string.
Split the string into words using whitespace as a delimiter.
Create a dictionary to store the word count.
Iterate through the words and increment the count in the dictionary.
Return the dictionary.
Q21. Due date of filing income tax return for companies
Companies must file their income tax return by the 15th day of the 3rd month after the end of their fiscal year.
Companies must file their income tax return by the 15th day of the 3rd month after the end of their fiscal year.
For example, if a company's fiscal year ends on December 31st, the income tax return would be due on March 15th.
Extensions may be available in certain circumstances, but the initial due date is typically the 15th day of the 3rd month after the fiscal year ...read more
Q22. Difference between ISO 27001 and SOC2 Type 2 audit
ISO 27001 focuses on information security management system while SOC2 Type 2 audit focuses on controls related to security, availability, processing integrity, confidentiality, and privacy.
ISO 27001 is an international standard that focuses on establishing, implementing, maintaining, and continually improving an information security management system (ISMS).
SOC2 Type 2 audit is a report based on the Trust Services Criteria, which focuses on controls related to security, avai...read more
Q23. What are the languages u know?
I know multiple programming languages including Java, Python, and C++.
Java
Python
C++
Q24. What is BRS and Income tax due dates
BRS stands for Bank Reconciliation Statement. Income tax due dates vary by country and type of taxpayer.
BRS is a statement prepared to reconcile the balance as per company's books with the balance as per bank statement.
Income tax due dates differ by country and type of taxpayer, usually falling on specific dates throughout the year.
For example, in the US, individual income tax returns are due by April 15th each year.
In India, the due date for filing income tax returns for ind...read more
Q25. What is the ASM message ?
ASM message stands for Application System Message.
ASM messages are used to communicate between different software applications.
They are used to exchange data and commands.
ASM messages can be sent synchronously or asynchronously.
They are commonly used in distributed systems.
Examples of ASM messages include HTTP requests and responses, SOAP messages, and JMS messages.
Q26. How to read data from an XL file using selenium
You can read data from an Excel file using Apache POI library in Selenium.
Use Apache POI library to interact with Excel files
Create a FileInputStream object to read the Excel file
Create a Workbook object to represent the Excel file
Get the desired sheet from the Workbook
Iterate through rows and cells to read data
Q27. The various annotations used in Springboot @Entity, @RestController etc
Annotations in Springboot like @Entity, @RestController are used for defining classes and endpoints respectively.
Annotations like @Entity are used to define JPA entities in Springboot.
Annotations like @RestController are used to define RESTful web services endpoints.
Annotations like @Autowired are used for dependency injection in Springboot.
Q28. What is the difference between cloud and LAN?
Cloud is a network of remote servers hosted on the internet to store, manage, and process data, while LAN is a local area network that connects computers in a limited area.
Cloud is accessed over the internet, while LAN is a local network within a specific physical location.
Cloud allows for scalability and flexibility in terms of resources, while LAN is limited by its physical boundaries.
Examples of cloud services include Amazon Web Services (AWS) and Microsoft Azure, while LA...read more
Q29. Readiness to work under pressure and stretched timings
I thrive in high-pressure environments and am accustomed to working long hours when necessary.
I have experience working in fast-paced environments where deadlines are tight.
I am able to prioritize tasks effectively to ensure timely completion.
I am adaptable and can handle unexpected challenges with a calm and focused approach.
I have successfully managed projects with demanding timelines, such as implementing a new system within a short timeframe.
I believe that pressure can br...read more
Q30. Checked and unchecked expections with example
Checked exceptions are checked at compile time, while unchecked exceptions are not.
Checked exceptions must be either caught or declared in the method signature using 'throws'
Unchecked exceptions do not need to be caught or declared
Example of checked exception: IOException
Example of unchecked exception: NullPointerException
Q31. Reason to change, what you know about IBS etc.
IBS is a common digestive disorder. Change due to better understanding of the condition and new treatment options.
IBS is short for Irritable Bowel Syndrome
It is a chronic condition that affects the large intestine
Symptoms include abdominal pain, bloating, and changes in bowel movements
Reasons for changing may include new research on the condition, better understanding of triggers, and new treatment options
Examples of treatment options include dietary changes, medication, and ...read more
Q32. Swap two strings without third variable
Swap two strings without using a third variable
Use XOR operation to swap characters of the strings in place
Loop through each character of the strings and perform XOR operation
Example: strings = ['hello', 'world'], after swapping: strings = ['world', 'hello']
Q33. How the BCMS is implemented
BCMS is implemented through a structured approach involving planning, implementation, monitoring, and continual improvement.
Develop a BCMS policy outlining objectives and scope
Conduct a risk assessment to identify threats and vulnerabilities
Implement controls to mitigate risks
Train employees on BCMS procedures and protocols
Regularly test and evaluate the effectiveness of the BCMS
Review and update the BCMS as needed based on changes in the organization or external factors
Q34. Due dates of filing gst return
GST returns are typically due on the 20th of the following month.
GST returns are usually due on the 20th of the month following the tax period.
For example, the GST return for the month of January would typically be due on February 20th.
Late filing of GST returns can result in penalties and interest charges.
Q35. add two numbers using microprocessor.
To add two numbers using a microprocessor, perform arithmetic operations using the microprocessor's instruction set.
Load the two numbers into registers
Use the microprocessor's addition instruction to add the numbers
Store the result in a register or memory location
Q36. Memory management and garbage collection in general
Memory management in Java involves automatic garbage collection to reclaim memory used by objects no longer in use.
Java uses automatic garbage collection to reclaim memory used by objects no longer in use
Garbage collection is performed by the JVM's garbage collector
Memory leaks can occur if objects are not properly dereferenced
Java provides the 'finalize()' method for objects to perform cleanup before being garbage collected
Q37. What is the oops conceptv!
OOPs is a programming paradigm based on the concept of objects that interact with each other.
OOPs stands for Object-Oriented Programming.
It focuses on creating objects that have properties and methods.
Encapsulation, inheritance, and polymorphism are the main pillars of OOPs.
Encapsulation is the process of hiding the internal details of an object from the outside world.
Inheritance allows a new class to be based on an existing class.
Polymorphism allows objects to take on multip...read more
Q38. sql- different joins with example
Different types of SQL joins with examples
Inner Join: Returns rows when there is a match in both tables
Left Join: Returns all rows from the left table and the matched rows from the right table
Right Join: Returns all rows from the right table and the matched rows from the left table
Full Outer Join: Returns rows when there is a match in either table
Q39. Write a program to find duplicate items in an int array.
Q40. difference between prdicate & consumer?
Predicate is a functional interface that represents a boolean-valued function, while Consumer is a functional interface that represents an operation that accepts a single input argument and returns no result.
Predicate is used for filtering elements based on a condition, while Consumer is used for performing actions on elements.
Predicate has a test() method to evaluate a condition, while Consumer has an accept() method to perform an action.
Example: Predicate
isEven = num -> nu...read more
Q41. Palindorme -Reverse a string
Reverse a string to check if it is a palindrome.
Create a function that takes a string as input
Reverse the string using built-in functions or manually
Compare the reversed string with the original string to check if it is a palindrome
Q42. AWS services used in my previous project
In my previous project, I used AWS services such as EC2, S3, and RDS for hosting, storage, and database management.
EC2 for hosting application servers
S3 for storing and retrieving files
RDS for managing relational databases
Q43. Explain the OOPS concept of Java in detail
OOPS concept in Java refers to Object-Oriented Programming principles like Inheritance, Encapsulation, Polymorphism, and Abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class. Example: class B extends class A.
Encapsulation: Bundling data and methods that operate on the data into a single unit. Example: private variables with public methods.
Polymorphism: Ability of a method to do different things based on the object it is acting upon. Ex...read more
Q44. Tds on professional payment
TDS on professional payments is a tax deducted at source on payments made to professionals for their services.
TDS rate on professional payments is usually 10%.
It is applicable when the payment exceeds a certain threshold amount.
The person making the payment is responsible for deducting TDS and depositing it with the government.
Failure to deduct TDS can lead to penalties and legal consequences.
Q45. Mat and its application
MAT stands for Market Access Tool, used in finance for analyzing market trends and making investment decisions.
MAT is a software tool that helps finance professionals analyze market data and trends.
It can be used to track stock prices, monitor market volatility, and make informed investment decisions.
MAT may also include features for risk management and portfolio optimization.
Examples of MAT tools include Bloomberg Terminal, Thomson Reuters Eikon, and FactSet.
Q46. How to perform Mouse actions
Mouse actions can be performed using Selenium WebDriver by using Actions class
Create an instance of Actions class
Use methods like moveToElement, click, doubleClick, contextClick, dragAndDrop, etc.
Perform the desired action by calling the respective method on the Actions object
Q47. Analyze a SOC2 Report
A SOC2 report is an audit report that attests to the controls in place at a service organization relevant to security, availability, processing integrity, confidentiality, and privacy.
Review the scope of the report to understand the services covered
Examine the auditor's opinion on the effectiveness of controls
Look for any exceptions or deficiencies noted in the report
Check the date of the report to ensure it is current
Assess any remediation plans or follow-up actions recommen...read more
Q48. Difference between interface and abstract
Interface defines a contract while abstract class provides partial implementation.
Interface only contains method signatures while abstract class can have both abstract and non-abstract methods.
A class can implement multiple interfaces but can only inherit from one abstract class.
Interfaces are used for achieving multiple inheritance while abstract classes are used for code reusability.
An interface cannot have a constructor while an abstract class can have one.
An interface can...read more
Q49. Explain OOPs concepts
OOPs concepts refer to the principles of Object-Oriented Programming, including encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: Bundling data and methods that operate on the data into a single unit (object).
Inheritance: Allowing a new class to inherit properties and behavior from an existing class.
Polymorphism: The ability for objects of different classes to respond to the same message in different ways.
Abstraction: Hiding the complex implementation d...read more
Q50. Explain Oops concept
Oops concept is a programming paradigm that focuses on objects and their interactions to solve complex problems.
Oops stands for Object-Oriented Programming
It emphasizes the use of classes and objects
Encapsulation, inheritance, and polymorphism are key principles of OOP
Objects have properties (attributes) and behaviors (methods)
Example: In a banking system, a class 'Account' can have attributes like account number and balance, and methods like deposit and withdraw
Q51. Difference between HashMap and HashTable
HashMap is non-synchronized and allows null values, while HashTable is synchronized and doesn't allow null values.
HashMap is faster than HashTable due to non-synchronization.
HashMap allows null values for both key and value.
HashTable doesn't allow null values for key or value.
HashMap is preferred for single-threaded applications.
HashTable is preferred for multi-threaded applications.
Both use key-value pairs to store and retrieve data.
Q52. Design pattern used in the project?
Singleton design pattern was used in the project.
Ensures a class has only one instance and provides a global point of access to it
Used when only one instance of a class is needed throughout the system
Example: Database connection manager, Logger classes
Q53. Spring IOC containers explain
Spring IOC containers are responsible for managing the instantiation of objects and their dependencies in a Spring application.
IOC stands for Inversion of Control, which means that the control of object creation is inverted from the application code to the Spring framework.
There are two main types of Spring IOC containers: BeanFactory and ApplicationContext.
BeanFactory is the simplest container, providing basic support for DI (Dependency Injection) and lifecycle management.
Ap...read more
Q54. Explain OOP Concepts with Example.
OOP Concepts are fundamental principles in object-oriented programming that help in organizing code efficiently.
Encapsulation: Bundling data and methods that operate on the data into a single unit (class). Example: Class Car with properties like make, model, and methods like start(), stop().
Inheritance: Allows a class to inherit properties and methods from another class. Example: Class SUV inheriting from class Car.
Polymorphism: Ability to present the same interface for diffe...read more
Q55. Explain projects
Projects are specific tasks or assignments that require planning, execution, and completion within a set timeframe.
Projects involve a defined scope, timeline, and budget.
They often require collaboration with team members or stakeholders.
Examples include developing a new software application, implementing a website redesign, or creating a marketing campaign.
Q56. Explain Rxjs, observable, subject
Rxjs is a library for reactive programming using observables and subjects.
Observables are streams of data that can be subscribed to.
Subjects are both an observable and an observer, allowing for multicasting.
Rxjs provides operators for manipulating and transforming data streams.
Reactive programming allows for asynchronous and event-driven programming.
Example: An observable can be created from an HTTP request and subscribed to for the response data.
Q57. ERP implementation process
The ERP implementation process involves planning, customization, testing, training, and deployment.
Planning phase involves defining project scope, goals, and timeline.
Customization phase includes configuring the ERP system to meet specific business needs.
Testing phase ensures the system functions correctly and meets requirements.
Training phase involves educating users on how to use the ERP system effectively.
Deployment phase involves rolling out the ERP system to all users an...read more
Q58. Oops Concepts of Java
Oops Concepts of Java are fundamental principles of object-oriented programming.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Inheritance: Allows a class to inherit properties and behavior from another class.
Polymorphism: Ability of a method to do different things based on the object it is acting upon.
Abstraction: Hiding the implementation details and showing only the necessary features of an object.
Q59. Alert handling in selenium
Alert handling in Selenium involves handling pop-up alerts, confirmation alerts, and prompt alerts.
Use driver.switchTo().alert() method to handle alerts
To accept an alert, use alert.accept() method
To dismiss an alert, use alert.dismiss() method
To get text from an alert, use alert.getText() method
To send text to a prompt alert, use alert.sendKeys() method
Q60. App Store Release process
The App Store release process involves submitting the app for review, ensuring it meets guidelines, and waiting for approval.
Submit the app for review through App Store Connect
Ensure the app meets Apple's guidelines and requirements
Wait for approval from Apple before the app can be published
Consider factors like app store optimization (ASO) and marketing strategies for a successful launch
Q61. Metaspace in java
Metaspace is a part of the Java HotSpot VM memory where class metadata is stored.
Metaspace replaces the permanent generation (PermGen) in Java 8 and later versions.
It is used to store class metadata such as class names, method names, field names, annotations, etc.
Metaspace is dynamically resized by the JVM based on the application's demand.
You can monitor Metaspace usage using tools like JConsole or VisualVM.
Q62. Explain threat lifecycle in java
Threat lifecycle in Java involves the stages of identification, prevention, detection, response, and recovery.
Identification: Recognizing potential threats and vulnerabilities in the Java application.
Prevention: Implementing security measures to mitigate the identified threats.
Detection: Monitoring the application for any signs of security breaches or attacks.
Response: Taking immediate action to address and mitigate the detected threats.
Recovery: Restoring the application's f...read more
Q63. Waits in selenium
Waits in Selenium are used to make the automation script wait for a certain condition to be met before proceeding.
Implicit Wait: Waits for a certain amount of time before throwing a NoSuchElementException.
Explicit Wait: Waits for a certain condition to be met before proceeding.
Fluent Wait: Waits for a condition with a defined maximum amount of time.
Thread.sleep(): Pauses the execution for a specified amount of time.
Q64. Internal working of hashmap
HashMap is a data structure that stores key-value pairs and uses hashing to quickly retrieve values based on keys.
HashMap internally uses an array of linked lists to store key-value pairs.
When a key-value pair is added, the key is hashed to determine the index in the array where it will be stored.
If multiple keys hash to the same index, a linked list is used to handle collisions.
To retrieve a value, the key is hashed again to find the corresponding index and then the linked l...read more
Q65. Oops concept in python.
Oops concept in Python refers to Object-Oriented Programming principles like inheritance, encapsulation, polymorphism, and abstraction.
Python supports object-oriented programming (OOP) concepts like classes, objects, inheritance, encapsulation, and polymorphism.
Inheritance allows a class to inherit attributes and methods from another class.
Encapsulation restricts access to certain components of an object, preventing direct modification.
Polymorphism allows objects to be treate...read more
More about working at IBS Software Services
Top HR Questions asked in Mu Sigma
Interview Process at Mu Sigma
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month