Add office photos
Employer?
Claim Account for FREE

Infosys Consulting

3.4
based on 354 Reviews
Filter interviews by

70+ Mathaiah Interview Questions and Answers

Updated 10 Dec 2024
Popular Designations

Q1. Use case scenario - in case a new engagement is awarded to Infosys, share how do you manage that Project/Program?

Ans.

Managing a new engagement awarded to Infosys

  • Conduct a kick-off meeting with the client to understand their requirements and expectations

  • Create a detailed project plan with timelines, milestones, and deliverables

  • Assign a project team with the required skills and expertise

  • Establish communication channels with the client and stakeholders

  • Monitor project progress and identify and mitigate risks

  • Ensure quality deliverables and timely completion of the project

  • Regularly report project...read more

View 8 more answers

Q2. How they will filter only a few candidates from a large pool of selected graduates

Ans.

Filtering candidates from a large pool of graduates

  • Define clear job requirements and qualifications

  • Use automated screening tools to filter resumes

  • Conduct initial phone screenings to assess communication skills

  • Administer technical assessments to evaluate coding abilities

  • Conduct in-person interviews to assess cultural fit and team dynamics

Add your answer

Q3. How AI can resolve the need for ticketing system, cost cutting, elevation pitch brainstorming techniques, role of outsourcing in process excellence decision, can outsourcing cut cost?

Ans.

AI can streamline ticketing systems, reduce costs, improve brainstorming techniques, and optimize outsourcing decisions.

  • AI can automate ticketing processes, reducing manual work and improving efficiency.

  • AI can analyze data to identify cost-saving opportunities and optimize resource allocation.

  • AI can enhance brainstorming sessions by providing data-driven insights and suggestions.

  • Outsourcing decisions can be optimized using AI algorithms to analyze factors like cost, quality, ...read more

Add your answer

Q4. How would you structure your approach to carry out change management ?

Ans.

To carry out change management, I would structure my approach by following these steps:

  • 1. Assess the current state: Understand the organization's current culture, processes, and readiness for change.

  • 2. Define the desired state: Clearly articulate the vision and goals of the change initiative.

  • 3. Develop a change management plan: Create a comprehensive plan that includes communication, training, and stakeholder engagement strategies.

  • 4. Identify and engage stakeholders: Identify...read more

Add your answer
Discover Mathaiah interview dos and don'ts from real experiences

Q5. How did you automate the claims process during your experience with the Insurer?

Ans.

Automated claims process by implementing RPA and AI technologies.

  • Identified repetitive tasks and processes in the claims process.

  • Implemented Robotic Process Automation (RPA) to automate data entry and validation.

  • Utilized Artificial Intelligence (AI) to automate claims assessment and decision-making.

  • Reduced claims processing time by 50% and improved accuracy by 90%.

  • Trained staff on new technologies and processes to ensure successful implementation.

Add your answer

Q6. What's BGP attributes and their works?

Ans.

BGP attributes are characteristics used to influence routing decisions in Border Gateway Protocol.

  • BGP attributes are used to determine the best path for routing traffic.

  • Some common BGP attributes include AS Path, Next Hop, Local Preference, and MED.

  • AS Path attribute shows the path of autonomous systems that the route has traversed.

  • Next Hop attribute indicates the IP address to reach the next hop for the route.

  • Local Preference attribute is used to influence the path selection ...read more

View 1 answer
Are these interview questions helpful?

Q7. For the Pharma Supply Chain what are the different data sources used and their general different phases in the organization? In the Commercial Analytics Dashboards generated, what are the KPIs and their respect...

read more
Ans.

Data sources, KPIs, and strategic framework for Pharma Supply Chain and new product launch in Pharma Domain

  • Data sources for Pharma Supply Chain include ERP systems, CRM systems, IoT devices, and external databases

  • Phases in the organization include procurement, manufacturing, distribution, and sales

  • KPIs for Commercial Analytics Dashboards include sales performance, inventory levels, demand forecasting accuracy, and supply chain efficiency

  • Analytical insights generated can inclu...read more

Add your answer

Q8. How to developed in company profit?

Ans.

To develop company profit, focus on increasing revenue, reducing costs, and improving operational efficiency.

  • Identify and pursue new business opportunities

  • Optimize pricing strategies

  • Improve customer retention and acquisition

  • Streamline operations and reduce wastage

  • Invest in marketing and sales initiatives

  • Expand into new markets or target new customer segments

View 1 answer
Share interview questions and help millions of jobseekers 🌟

Q9. What is primary key and application of primary key

Ans.

Primary key is a unique identifier for a record in a database table.

  • Primary key ensures data integrity by preventing duplicate records.

  • It is used to establish relationships between tables in a database.

  • Primary key can be a single column or a combination of columns.

  • Examples of primary key include social security number, email address, etc.

Add your answer

Q10. What is a difference between waterfall model and agile model?

Ans.

Waterfall model is a linear sequential approach while Agile model is an iterative approach.

  • Waterfall model follows a sequential process while Agile model follows an iterative process.

  • Waterfall model is more rigid and structured while Agile model is more flexible and adaptable.

  • Waterfall model requires complete and detailed planning upfront while Agile model allows for changes and adjustments throughout the project.

  • Waterfall model is best suited for projects with well-defined r...read more

Add your answer

Q11. Confidence & academic excellence lands you in infy

Ans.

Confidence and academic excellence are important qualities for success at Infosys.

  • Infosys values employees who are confident in their abilities and have a strong academic background.

  • Confidence allows employees to take on new challenges and responsibilities.

  • Academic excellence demonstrates a strong work ethic and dedication to learning.

  • These qualities can lead to success and advancement within the company.

  • For example, an employee who is confident in their abilities may be more...read more

Add your answer

Q12. How to created in new technology for my company product

Ans.

Creating new technology for a company product requires research, innovation, and collaboration.

  • Identify the problem or need that the new technology will address

  • Conduct research on existing technologies and potential solutions

  • Brainstorm and ideate with a team to generate new ideas

  • Prototype and test the new technology to ensure it meets the desired specifications

  • Collaborate with cross-functional teams to integrate the new technology into the product

  • Continuously iterate and impr...read more

Add your answer

Q13. What is the general accounting

Ans.

General accounting refers to the process of recording, summarizing, and reporting financial transactions of an organization.

  • General accounting involves recording all financial transactions of a company, such as sales, purchases, expenses, and payments.

  • It includes the preparation of financial statements, such as the balance sheet, income statement, and cash flow statement.

  • General accounting ensures compliance with accounting principles and standards, such as Generally Accepted...read more

View 3 more answers

Q14. Write a query to display female count from emp table

Ans.

Query to display female count from emp table

  • Use SELECT COUNT(*) to count the number of rows

  • Use WHERE clause to filter for female employees

  • Use the gender column in the emp table

Add your answer

Q15. Difference Between Rip version 1 and 2?

Ans.

RIP version 1 is a classful routing protocol while RIP version 2 is a classless routing protocol.

  • RIP version 1 does not support VLSM (Variable Length Subnet Masking) while RIP version 2 does.

  • RIP version 1 does not support authentication while RIP version 2 does.

  • RIP version 1 broadcasts routing updates using the destination IP address 255.255.255.255 while RIP version 2 uses multicast address 224.0.0.9.

  • RIP version 1 sends the entire routing table in updates while RIP version 2...read more

View 1 answer

Q16. How many laptops in newyork

Ans.

It is impossible to accurately determine the number of laptops in New York without more specific information.

  • The question is too broad and lacks specific information such as the time frame, type of laptops, and location within New York.

  • The number of laptops in New York is constantly changing due to purchases, sales, and replacements.

  • There are many different types of laptops, including personal, business, and educational, which would affect the number.

  • The location within New Y...read more

Add your answer

Q17. What are the trends in insurance?

Ans.

Insurance trends include digitalization, personalized policies, and increased focus on customer experience.

  • Digitalization of insurance processes and services

  • Personalized policies based on data analytics and customer behavior

  • Increased focus on customer experience and satisfaction

  • Emergence of new insurance products such as cyber insurance and usage-based insurance

  • Growing importance of insurtech startups and partnerships

  • Shift towards proactive risk management and prevention

  • Incre...read more

Add your answer

Q18. Write a java code to swap two numbers without using a temporary variable

Ans.

Swapping two numbers without using a temporary variable in Java

  • Use bitwise XOR operation to swap two numbers without using a temporary variable

  • Example: int a = 5, b = 10; a = a ^ b; b = a ^ b; a = a ^ b; // Now a = 10, b = 5

Add your answer

Q19. What is the sap?

Ans.

SAP is an enterprise resource planning software that helps businesses manage various aspects of their operations.

  • SAP stands for Systems, Applications, and Products in Data Processing.

  • It is a software suite that integrates different modules to support various business functions.

  • SAP FICO (Financial Accounting and Controlling) is a module within SAP that focuses on financial management and accounting processes.

  • SAP provides real-time data processing, analytics, and reporting capa...read more

View 3 more answers

Q20. What is the purpose of square programing

Ans.

Square programming is not a commonly known term in software engineering.

  • There is no known purpose of square programming in software engineering.

  • It is possible that the interviewer may have meant something else.

  • It is important to clarify the question before answering.

  • Square programming may refer to a specific tool or framework used in a particular project.

Add your answer

Q21. What is the full mean sap

Ans.

SAP stands for Systems, Applications, and Products in Data Processing.

  • SAP is a software company that provides enterprise resource planning (ERP) solutions.

  • SAP software is used by businesses to manage their operations and finances.

  • SAP has various modules such as FICO, MM, SD, HR, etc. that cater to different business needs.

  • SAP FICO is a module that deals with financial accounting and controlling.

  • SAP is widely used in industries such as manufacturing, retail, healthcare, etc.

View 1 answer

Q22. What's the RB ?

Ans.

RB stands for Routing and Bridging. It refers to the process of forwarding data packets between networks.

  • RB is a fundamental concept in networking.

  • It involves the routing of data packets between different networks.

  • Bridging refers to the process of connecting two or more network segments together.

  • RB helps in efficient data transmission and network connectivity.

  • Example: RB is used in routers to determine the best path for data packets to reach their destination.

View 1 answer

Q23. What's STP protocol?

Ans.

STP (Spanning Tree Protocol) is a network protocol that prevents loops in Ethernet networks by creating a loop-free logical topology.

  • STP is used to prevent broadcast storms and network congestion caused by loops.

  • It works by electing a root bridge and calculating the shortest path to the root bridge for each network segment.

  • STP uses Bridge Protocol Data Units (BPDU) to exchange information between switches.

  • It employs a tree-like structure with designated ports and blocked port...read more

View 2 more answers

Q24. What is the work of JVM

Ans.

JVM stands for Java Virtual Machine. It is responsible for executing Java bytecode.

  • JVM is a part of the Java Runtime Environment (JRE)

  • It interprets compiled Java code and executes it on the computer

  • JVM provides platform independence to Java programs

  • It manages memory allocation and garbage collection

  • JVM also provides security by enforcing Java's security model

Add your answer

Q25. 2. How many cases you have automated

Ans.

I have automated around 200 test cases in my previous job.

  • Automated test cases for web applications using Selenium WebDriver

  • Automated API test cases using RestAssured

  • Automated mobile app test cases using Appium

  • Used TestNG and JUnit frameworks for test automation

  • Implemented data-driven and keyword-driven testing approaches

Add your answer

Q26. What is cloud computing

Ans.

Cloud computing is the delivery of computing services over the internet.

  • Cloud computing allows users to access data and applications from anywhere with an internet connection.

  • It eliminates the need for physical servers and hardware, reducing costs and increasing scalability.

  • Examples of cloud computing services include Amazon Web Services, Microsoft Azure, and Google Cloud Platform.

Add your answer

Q27. How to identify mergdf

Ans.

Mergers can be identified through various methods.

  • Analyzing financial statements of companies involved

  • Monitoring news and press releases

  • Looking for changes in ownership or management

  • Tracking stock prices and trading volumes

  • Consulting industry experts and analysts

Add your answer

Q28. VBA and coding experience of any?

Ans.

Yes, I have experience in VBA and coding.

  • I have worked on automating tasks in Excel using VBA.

  • I have also developed small applications using Visual Basic .NET.

  • I am familiar with programming concepts such as loops, conditional statements, and functions.

  • I have experience in debugging and troubleshooting code.

  • I am always eager to learn new programming languages and technologies.

Add your answer

Q29. Difference between 2 stroke and 4 stroke engine

Ans.

2 stroke engines have a power stroke in every revolution while 4 stroke engines have a power stroke in every other revolution.

  • 2 stroke engines have a simpler design and are lighter than 4 stroke engines.

  • 2 stroke engines have a higher power-to-weight ratio than 4 stroke engines.

  • 4 stroke engines are more fuel efficient and have a longer lifespan than 2 stroke engines.

  • 2 stroke engines are commonly used in small power tools and motorcycles while 4 stroke engines are used in cars ...read more

Add your answer

Q30. What are the chart account

Ans.

Chart of accounts is a list of all the accounts used by an organization to record financial transactions.

  • Chart of accounts is a structured list of general ledger accounts.

  • It provides a framework for organizing financial transactions and generating financial statements.

  • Each account in the chart of accounts represents a unique category of transactions.

  • Accounts are classified into different groups such as assets, liabilities, equity, revenue, and expenses.

  • Examples of chart of ac...read more

View 3 more answers

Q31. Why did you choose software side

Ans.

I chose software side because of my passion for technology and problem-solving.

  • Passion for technology and innovation

  • Enjoy problem-solving and critical thinking

  • Opportunities for growth and learning

  • High demand and job security

  • Examples: building websites, creating mobile apps, automating processes

Add your answer

Q32. What about ecpect in my cimpany

Ans.

Our company values quality and continuous improvement in software testing.

  • We have a dedicated team for software testing

  • We follow industry-standard testing methodologies

  • We encourage and support continuous learning and development

  • We prioritize quality over speed

  • We have a culture of collaboration and open communication

Add your answer

Q33. How r u? Ur ambitiin grow in infosys

Ans.

I am doing well, and my ambition is to grow in Infosys by continuously learning and contributing to innovative technology solutions.

  • I am doing well and excited about the opportunities at Infosys.

  • I am focused on expanding my knowledge and skills in technology.

  • I aim to contribute to the growth and success of Infosys through my work.

  • I am eager to take on new challenges and responsibilities to advance my career.

Add your answer

Q34. What is the latest trend in IDMP with FDA

Add your answer

Q35. Approach for conflict management

Ans.

My approach for conflict management involves active listening, empathy, and finding common ground.

  • Listen actively to both parties involved

  • Show empathy and understanding towards each person's perspective

  • Find common ground and work towards a mutually beneficial solution

  • Encourage open communication and respect for each other's opinions

  • If necessary, involve a neutral third party mediator

  • Follow up to ensure the resolution is working for all parties involved

Add your answer

Q36. Explain the R&R of a BA

Ans.

R&R of a BA refers to Roles and Responsibilities of a Business Analyst.

  • The BA is responsible for gathering and analyzing business requirements.

  • They work closely with stakeholders to ensure project success.

  • The BA must have strong communication and problem-solving skills.

  • They may also be involved in testing and quality assurance.

  • The BA plays a crucial role in bridging the gap between business and IT.

  • Examples of BA responsibilities include creating use cases, process flows, and ...read more

Add your answer

Q37. What are the company's values? ...

Ans.

Our company values integrity, innovation, and teamwork.

  • Integrity: We always act with honesty and transparency in all our dealings.

  • Innovation: We encourage creativity and constantly strive to improve our products and services.

  • Teamwork: We work collaboratively to achieve our goals and support each other.

Add your answer

Q38. What is 3NF in normalization

Ans.

3NF is a database normalization technique that eliminates redundant data.

  • Each non-key attribute is dependent on the primary key

  • No transitive dependencies between non-key attributes

  • Reduces data redundancy and improves data integrity

  • Example: A table with customer details and their orders can be normalized to 3NF

Add your answer

Q39. Difference b/w c and c++

Ans.

C is a procedural programming language while C++ is an object-oriented programming language.

  • C++ supports classes and objects while C does not.

  • C++ has better support for polymorphism and inheritance than C.

  • C++ has a larger standard library than C.

  • C++ allows function overloading while C does not.

  • C++ supports exception handling while C does not.

Add your answer

Q40. MS AZURE functions issue and their rectification?

Ans.

MS Azure functions issue and rectification

  • Common issues with MS Azure functions include timeout errors, memory allocation problems, and authentication issues

  • Rectification methods may involve adjusting timeout settings, optimizing memory usage, and verifying authentication credentials

  • Examples of rectification steps include increasing timeout limits, optimizing code for better performance, and checking Azure AD configurations

Add your answer

Q41. How to write programing

Ans.

Programming is the process of designing, writing, testing, and maintaining computer programs.

  • Understand the problem and break it down into smaller parts

  • Choose a programming language and write the code

  • Test the program and debug any errors

  • Maintain the program by updating and improving it

  • Use best practices such as commenting and version control

  • Examples: Java, Python, C++

Add your answer

Q42. What is function overloading

Ans.

Function overloading is the ability to have multiple functions with the same name but different parameters.

  • Functions with the same name but different parameters can be defined in the same scope

  • The compiler determines which function to call based on the number and types of arguments passed

  • Overloading can improve code readability and reduce code duplication

Add your answer

Q43. What you know about sap sd

Ans.

SAP SD stands for Sales and Distribution module of SAP ERP system used for managing sales, shipping, billing, and invoicing processes.

  • SAP SD is a module of SAP ERP system

  • It is used for managing sales, shipping, billing, and invoicing processes

  • It integrates with other modules like MM, FI, and CO

  • It includes functionalities like pricing, credit management, and order management

  • It helps in streamlining the sales process and improving customer satisfaction

  • Example: A company can use...read more

Add your answer

Q44. What is the communication

Ans.

Communication is the exchange of information between two or more parties.

  • It involves a sender, a message, a channel, a receiver, and feedback.

  • Effective communication requires clarity, conciseness, and consideration.

  • Communication can be verbal, nonverbal, written, or visual.

  • Examples include conversations, emails, presentations, and body language.

Add your answer

Q45. What is different outlook and o365

Ans.

Outlook is an email client while O365 is a cloud-based suite of productivity tools.

  • Outlook is a standalone email client software used for sending and receiving emails.

  • O365 (Office 365) is a cloud-based suite of productivity tools including email, collaboration, and communication services.

  • Outlook can be used with different email providers, while O365 includes Outlook as part of its suite.

  • O365 offers additional features like online storage, video conferencing, and document coll...read more

Add your answer

Q46. Standards about project management methodologies in (offshore/onshore) model

Ans.

Standards for project management methodologies vary between offshore and onshore models.

  • Offshore model may require more detailed communication plans due to distance and time zone differences

  • Onshore model may focus more on face-to-face interactions and quick decision-making processes

  • Both models should adhere to industry standards such as PMBOK or Agile frameworks

  • Regular status updates and progress reports are crucial in both models to ensure project success

Add your answer

Q47. How do you manage risks

Ans.

I manage risks by identifying, assessing, prioritizing, and mitigating them.

  • Identify potential risks through analysis and evaluation

  • Assess the likelihood and impact of each risk

  • Prioritize risks based on their potential impact

  • Develop and implement mitigation strategies

  • Regularly monitor and review risks to ensure effectiveness of mitigation measures

Add your answer

Q48. What is link list?

Ans.

A link list is a linear data structure where each element is a separate object with a pointer to the next element.

  • Link list is used to store data in a non-contiguous manner.

  • It allows for efficient insertion and deletion of elements.

  • Examples include singly linked list, doubly linked list, and circular linked list.

Add your answer

Q49. What is circular dependency?

Ans.

Circular dependency occurs when two or more modules depend on each other, creating an infinite loop.

  • Circular dependency can lead to issues such as infinite loops, runtime errors, and difficulties in debugging.

  • It is common in programming languages like JavaScript, where modules can import each other in a circular manner.

  • To resolve circular dependencies, refactoring code to remove the dependency or using a third-party tool like Webpack can be helpful.

Add your answer

Q50. Write a program using OOPS in java

Ans.

A program using OOPS in Java to demonstrate inheritance and polymorphism

  • Create a superclass 'Animal' with methods like 'eat' and 'sleep'

  • Create subclasses like 'Dog' and 'Cat' that inherit from 'Animal'

  • Override the 'eat' method in each subclass to show polymorphism

Add your answer

Q51. What is the vendor master data

Add your answer

Q52. Project done in graduation

Ans.

Developed a web-based student information system for a university

  • Used PHP and MySQL for backend development

  • Implemented user authentication and authorization

  • Designed a responsive UI using Bootstrap framework

Add your answer

Q53. What is phython

Ans.

Python is a high-level, interpreted programming language known for its simplicity, readability, and versatility.

  • Python is used for web development, data analysis, artificial intelligence, and more.

  • It has a large standard library and supports multiple programming paradigms.

  • Python code is often shorter and easier to read than other languages.

  • It uses indentation to indicate code blocks instead of curly braces or keywords.

  • Python is open-source and has a large and active community...read more

Add your answer

Q54. What you know about processes

Ans.

Processes refer to a series of steps or actions taken to achieve a specific goal or outcome.

  • Processes are used in various industries and fields, such as manufacturing, software development, and project management.

  • They involve a set of activities that are performed in a specific order to achieve a desired result.

  • Processes can be documented and standardized to ensure consistency and efficiency.

  • Examples of processes include product development, quality control, and customer serv...read more

Add your answer

Q55. Typical P2P process flow

Ans.

The typical P2P process flow involves requisition, approval, purchase order creation, goods receipt, invoice receipt, and payment.

  • Requisition: Request for goods or services

  • Approval: Authorization of the requisition

  • Purchase Order Creation: Formal order placed with supplier

  • Goods Receipt: Receipt of goods/services

  • Invoice Receipt: Receipt of invoice from supplier

  • Payment: Settlement of invoice

Add your answer

Q56. Explain about Digital Twins

Ans.

Digital twins are virtual replicas of physical objects, processes, or systems that can be used for analysis, monitoring, and prediction.

  • Digital twins are created using real-time data from sensors and other sources to simulate the behavior and performance of the physical counterpart.

  • They can be used in various industries such as manufacturing, healthcare, and transportation to optimize operations and improve decision-making.

  • For example, in healthcare, digital twins of patients...read more

Add your answer

Q57. Explain the drawbacks

Ans.

Drawbacks of what? Please provide context.

  • Please provide context for the question

  • Without context, it is impossible to provide a meaningful answer

  • Drawbacks can vary depending on the specific situation or technology being discussed

Add your answer

Q58. What waterfall model ?

Ans.

Waterfall model is a linear sequential approach to software development.

  • It follows a sequential process where each phase must be completed before moving on to the next.

  • It includes phases like requirements gathering, design, implementation, testing, deployment, and maintenance.

  • It is a rigid model and changes cannot be easily accommodated once a phase is completed.

  • It is suitable for projects with well-defined requirements and stable technology.

  • Example: Developing a software for...read more

Add your answer

Q59. State laws of thermodynsmics

Ans.

The laws of thermodynamics describe the behavior of energy in a system.

  • First law: Energy cannot be created or destroyed, only transferred or converted.

  • Second law: Entropy (disorder) always increases in a closed system.

  • Third law: As temperature approaches absolute zero, entropy approaches a minimum.

  • Examples: A car engine converting fuel into motion, a refrigerator cooling a room, a power plant generating electricity.

Add your answer

Q60. why ITconsulting

Ans.

IT consulting is important for helping businesses improve their technology infrastructure, optimize processes, and stay competitive in the digital age.

  • Provides expertise and guidance on implementing new technologies

  • Helps businesses streamline processes and increase efficiency

  • Assists in identifying and mitigating cybersecurity risks

  • Supports digital transformation initiatives

  • Enables businesses to stay competitive in the market

  • Examples: Accenture, Deloitte, IBM

Add your answer

Q61. Difference between SIP and H323

Ans.

SIP and H323 are both protocols used for multimedia communication over IP networks.

  • SIP is a newer protocol and is more widely used for VoIP and video conferencing.

  • H323 is an older protocol and is mainly used for video conferencing.

  • SIP is simpler and more flexible than H323.

  • SIP uses HTTP-like messages while H323 uses binary messages.

  • SIP is easier to configure and troubleshoot than H323.

  • Examples of SIP-based applications include Skype, WhatsApp, and Google Voice.

  • Examples of H32...read more

Add your answer

Q62. What is oops concepts

Ans.

OOPs concepts are the principles of Object-Oriented Programming that focus on encapsulation, inheritance, polymorphism, and abstraction.

  • Encapsulation is the process of hiding the implementation details of an object from the outside world.

  • Inheritance is the process of creating a new class from an existing class, inheriting all the properties and methods of the parent class.

  • Polymorphism is the ability of an object to take on many forms, allowing objects of different classes to ...read more

Add your answer

Q63. Softwares that you are efficient in

Ans.

I am efficient in Adobe Creative Suite, Sketch, and Figma.

  • Proficient in Adobe Photoshop for photo editing and manipulation

  • Skilled in Adobe Illustrator for vector graphics and logo design

  • Experienced in Sketch for UI/UX design and prototyping

  • Familiar with Figma for collaborative design and prototyping

Add your answer

Q64. What is petty expenses

Add your answer

Q65. What is the Nees submission

Add your answer

Q66. difference between hml and json

Ans.

HTML is a markup language used for creating web pages, while JSON is a data interchange format used for transmitting data between servers and web applications.

  • HTML is used for creating the structure and content of web pages, while JSON is used for transmitting data between servers and web applications.

  • HTML uses tags to define elements on a web page, while JSON uses key-value pairs to represent data.

  • HTML is primarily used for displaying content to users, while JSON is used for...read more

Add your answer

Q67. Write programme in c language

Ans.

Program to print 'Hello, World!' in C language

  • Include stdio.h header file

  • Use printf() function to print 'Hello, World!'

  • Return 0 at the end of the program

Add your answer

Q68. What is payable

Add your answer

Q69. What is payment

Add your answer

Q70. What is string?

Ans.

A string is a sequence of characters.

  • Strings are used to represent text in programming languages.

  • Strings are enclosed in quotation marks.

  • Strings can be concatenated using the + operator.

  • Strings can be indexed and sliced like arrays.

  • Examples: 'hello world', '123', 'my name is John'.

Add your answer

Q71. WHAT IS JAVA

Ans.

Java is a high-level, object-oriented programming language used for developing desktop, web, and mobile applications.

  • Java is platform-independent, meaning it can run on any operating system

  • It is known for its security features, making it a popular choice for enterprise applications

  • Java code is compiled into bytecode, which can be run on a Java Virtual Machine (JVM)

  • Popular frameworks and tools for Java development include Spring, Hibernate, and Maven

Add your answer

Q72. What in tax invoice

Add your answer

Q73. What is DADI PLM

Add your answer

Q74. Explain subcontracting process

Ans.

Subcontracting process involves sending raw materials to a subcontractor for processing and receiving finished goods back.

  • Raw materials are sent to a subcontractor for processing

  • Subcontractor processes the raw materials and returns finished goods

  • Goods receipt is done in SAP to receive the finished goods back

  • Subcontracting purchase order is created to track the process

Add your answer

Q75. Explain p2p cycle

Ans.

P2P cycle stands for Procure to Pay cycle, which is the process of obtaining goods or services from a vendor and paying for them.

  • The cycle starts with the need for a product or service, followed by creating a purchase requisition.

  • Next, a purchase order is generated and sent to the vendor.

  • Goods or services are received and inspected upon delivery.

  • An invoice is received from the vendor and matched with the purchase order and goods receipt.

  • Finally, payment is made to the vendor ...read more

Add your answer

Q76. JAVA IS OOP

Ans.

Yes, Java is an object-oriented programming language.

  • Java supports the four main principles of OOP: encapsulation, inheritance, abstraction, and polymorphism.

  • Objects are created from classes in Java.

  • Java has access modifiers such as public, private, and protected to control access to class members.

  • Java also has interfaces, which allow for multiple inheritance.

  • Example: class Car { private String make; public void setMake(String make) { this.make = make; } }

  • Example: interface A...read more

Add your answer

Q77. Explain about IDMP

Add your answer

Q78. Give Introduction

Ans.

I am a highly motivated and experienced HR professional with a proven track record of successfully managing recruitment, employee relations, and training programs.

  • Over 10 years of experience in HR management

  • Strong background in recruitment and employee relations

  • Skilled in developing and implementing training programs

  • Proven track record of improving employee satisfaction and retention rates

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Mathaiah

based on 25 interviews in the last 1 year
Interview experience
3.7
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.5
 • 655 Interview Questions
3.7
 • 274 Interview Questions
4.1
 • 272 Interview Questions
3.8
 • 266 Interview Questions
3.3
 • 145 Interview Questions
4.3
 • 139 Interview Questions
View all
Top Infosys Consulting Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter