Add office photos
Employer?
Claim Account for FREE

KPMG India

3.5
based on 5.5k Reviews
Filter interviews by

400+ Honda Motorcycle & Scooter Interview Questions and Answers

Updated 1 Mar 2025
Popular Designations

Q101. Introduction. Describe information security. Any examples of cybersecurity concerns recently? What are your intentions for going ahead?

Add your answer

Q102. What are the differences between WebDriver and ChromeDriver?

Ans.

WebDriver is a tool for automating web application testing, while ChromeDriver is a specific implementation for controlling Chrome browser.

  • WebDriver is a generic tool that supports multiple browsers, while ChromeDriver is specifically for Chrome browser.

  • WebDriver provides a common API for interacting with different browsers, while ChromeDriver is used to control Chrome browser instances.

  • WebDriver can be used with different browsers like Firefox, Safari, etc., while ChromeDriv...read more

Add your answer

Q103. What is the Selenium architecture in relation to C#?

Ans.

Selenium architecture allows for automation testing of web applications using C# bindings.

  • Selenium WebDriver interacts with web browsers to automate testing

  • C# bindings provide a way to write test scripts in C# language

  • Selenium Grid allows for parallel testing on multiple machines

  • Selenium IDE for recording and playback of test scripts

Add your answer

Q104. Have you ever managed cookies and caches in automation?

Ans.

Yes, I have experience managing cookies and caches in automation.

  • Yes, I have written automation scripts to handle cookies by setting, getting, and deleting them.

  • I have also managed browser caches in automation to ensure accurate testing results.

  • Utilized tools like Selenium WebDriver to interact with cookies and caches during test execution.

Add your answer
Discover Honda Motorcycle & Scooter interview dos and don'ts from real experiences

Q105. Do you know any. Programming language??

Ans.

Yes, I am proficient in programming languages such as Python, Java, and SQL.

  • Proficient in Python for data analysis and automation tasks

  • Experience with Java for backend development

  • Knowledge of SQL for database management

Add your answer

Q106. What all publishers are available in market?

Ans.

Some popular publishers in the market include Penguin Random House, HarperCollins, Simon & Schuster, and Hachette Book Group.

  • Penguin Random House

  • HarperCollins

  • Simon & Schuster

  • Hachette Book Group

Add your answer
Are these interview questions helpful?

Q107. How do you calculate irr value?

Ans.

IRR is calculated by finding the discount rate that makes the net present value of cash flows equal to zero.

  • IRR is a financial metric used to evaluate the profitability of an investment.

  • It takes into account the time value of money and the cash flows generated by the investment.

  • To calculate IRR, you need to know the initial investment, the cash flows generated by the investment, and the time period over which the cash flows occur.

  • IRR is the discount rate that makes the net pr...read more

Add your answer

Q108. Explain Joins and How they are used?

Ans.

Joins are used in databases to combine rows from two or more tables based on a related column between them.

  • Joins are used to retrieve data from multiple tables based on a related column.

  • Common types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN.

  • INNER JOIN returns rows when there is at least one match in both tables.

  • LEFT JOIN returns all rows from the left table and the matched rows from the right table.

  • RIGHT JOIN returns all rows from the right table and t...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q109. Do you have knowledge about MS Excel?

Ans.

Yes, I have knowledge about MS Excel.

  • Proficient in creating and formatting spreadsheets

  • Skilled in using formulas and functions

  • Experienced in data analysis and visualization

  • Familiar with pivot tables and charts

Add your answer

Q110. What is lacking in current cyber lanscape.

Ans.

Lack of proactive measures, shortage of skilled professionals, and increasing sophistication of cyber threats are major issues in the current cyber landscape.

  • Lack of proactive measures to prevent cyber attacks

  • Shortage of skilled professionals in the cybersecurity field

  • Increasing sophistication of cyber threats such as ransomware and phishing attacks

Add your answer

Q111. how do i analyse a company's fundamentals

Ans.

Analyzing a company's fundamentals involves evaluating its financial statements, management team, industry position, and competitive advantage.

  • Review financial statements such as income statement, balance sheet, and cash flow statement to assess profitability, liquidity, and solvency.

  • Evaluate management team's experience, track record, and strategic vision.

  • Assess the company's industry position, market share, growth potential, and competitive landscape.

  • Analyze competitive adv...read more

Add your answer

Q112. Do you know AWS and Azure Cloud services

Ans.

Yes, I am familiar with both AWS and Azure cloud services.

  • I have experience working with AWS services such as EC2, S3, RDS, and Lambda

  • I have also worked with Azure services like Virtual Machines, Blob Storage, and Azure Functions

  • I am familiar with the differences between AWS and Azure and when to use each platform

Add your answer

Q113. What is java bean class, singleton class

Ans.

Java bean class is a reusable software component and singleton class restricts the instantiation of a class to one object.

  • Java bean class is a POJO (Plain Old Java Object) that encapsulates many objects into a single object for easy access.

  • It follows a naming convention where the class name starts with a capital letter and has a public default constructor.

  • Singleton class is a design pattern that ensures only one instance of a class is created and provides a global point of ac...read more

Add your answer

Q114. Frequently used functions and other tools used in excel for data analytics.

Ans.

Common functions and tools in Excel for data analytics

  • Pivot tables for summarizing and analyzing data

  • VLOOKUP and HLOOKUP for searching and retrieving data

  • IF, SUMIF, and COUNTIF for conditional calculations

  • Data validation for ensuring data accuracy

  • Charts and graphs for visualizing data trends

Add your answer

Q115. What do you know about auditing?

Ans.

Auditing is the process of examining financial records to ensure accuracy and compliance with laws and regulations.

  • Auditing involves reviewing financial statements, records, and transactions.

  • It is done to ensure that financial information is accurate and reliable.

  • Auditors also check for compliance with laws and regulations.

  • There are different types of audits, such as internal, external, and forensic audits.

  • Auditing is important for maintaining transparency and accountability ...read more

Add your answer

Q116. How to support to Plant and Business through your technical knowledge

Ans.

I can provide technical expertise to optimize plant operations and support business goals.

  • Implementing new technologies to improve efficiency and reduce costs

  • Troubleshooting technical issues to minimize downtime

  • Training plant staff on new equipment and processes

  • Collaborating with cross-functional teams to drive continuous improvement

  • Analyzing data to identify areas for optimization and growth

Add your answer

Q117. Write a program to check if a program is palindrome

Ans.

Program to check if a string is a palindrome

  • Create a function that takes a string as input

  • Remove all non-alphanumeric characters and convert to lowercase

  • Compare the string with its reverse to check if it's a palindrome

Add your answer

Q118. Risk assessment steps for onboarding news applications

Ans.

Risk assessment steps for onboarding new applications involve identifying potential threats, evaluating vulnerabilities, and implementing controls.

  • Identify potential threats such as data breaches, malware attacks, and unauthorized access.

  • Evaluate vulnerabilities in the application's design, code, and infrastructure.

  • Implement controls such as encryption, access controls, and regular security audits.

  • Conduct regular risk assessments to identify new threats and vulnerabilities.

  • Tr...read more

Add your answer

Q119. How would you structure an industry study?

Ans.

An industry study can be structured by defining the scope, conducting research, analyzing data, and presenting findings.

  • Define the scope of the study including the industry sector, key players, market trends, and challenges.

  • Conduct thorough research using a combination of primary and secondary sources such as interviews, surveys, reports, and databases.

  • Analyze the collected data using tools like SWOT analysis, Porter's Five Forces, and market segmentation.

  • Present the findings...read more

Add your answer

Q120. Difference between slicer and filter?

Ans.

Slicers and filters are both used to control data visibility in Power BI, but slicers are visual elements while filters can be applied programmatically.

  • Slicers are visual controls that allow users to select values from a predefined list, which filters the data accordingly.

  • Filters can be applied programmatically using DAX formulas or Power Query M language.

  • Slicers are typically used for interactive data exploration and analysis, while filters are more commonly used for data ma...read more

View 2 more answers

Q121. When a company has revenues falling and still in profit

Ans.

When a company has falling revenues but is still profitable, it may be due to cost-cutting measures, increased efficiency, or diversified revenue streams.

  • Cost-cutting measures may include reducing overhead expenses, renegotiating contracts, or streamlining operations.

  • Increased efficiency in production processes or sales strategies can help maintain profitability despite falling revenues.

  • Diversified revenue streams, such as expanding into new markets or offering new products/s...read more

Add your answer

Q122. Ind AS Knowledge of Ind AS 109, 107 & 32

Ans.

Ind AS 109, 107 & 32 are accounting standards used in India.

  • Ind AS 109 deals with financial instruments and their classification, measurement, and impairment.

  • Ind AS 107 deals with disclosures related to financial instruments.

  • Ind AS 32 deals with financial instruments presentation.

  • These standards are used by companies in India to prepare their financial statements in accordance with the Indian Accounting Standards (Ind AS).

Add your answer

Q123. Difference between US GAAP and IFRS

Ans.

US GAAP and IFRS are two different accounting standards used globally.

  • US GAAP is rules-based while IFRS is principles-based.

  • US GAAP allows LIFO inventory accounting while IFRS does not.

  • IFRS requires more extensive disclosures in financial statements.

  • US GAAP allows for extraordinary items to be reported separately while IFRS does not.

  • IFRS requires the capitalization of development costs while US GAAP does not.

  • US GAAP requires the use of the indirect method for the statement of...read more

Add your answer

Q124. Intermediate SQL with group by, with clause

Ans.

Intermediate SQL with group by and with clause

  • GROUP BY is used to group rows based on a column or expression

  • WITH clause is used to create a temporary table or subquery

  • Can be used together to perform complex queries

  • Example: SELECT column1, SUM(column2) FROM table1 GROUP BY column1

  • Example: WITH temp_table AS (SELECT column1, column2 FROM table1) SELECT * FROM temp_table

Add your answer

Q125. Do you know how to build a dashboard?

Ans.

Yes, I know how to build a dashboard.

  • Identify key metrics and data sources

  • Choose appropriate visualization tools

  • Design layout for easy understanding

  • Include interactive elements for user engagement

Add your answer

Q126. How did you do implementation in real time

Ans.

I have experience with implementing new processes and systems in real time by carefully planning, communicating with stakeholders, and monitoring progress.

  • Develop a detailed implementation plan outlining tasks, timelines, and responsibilities

  • Communicate effectively with team members and stakeholders to ensure everyone is on the same page

  • Monitor progress regularly and make adjustments as needed to stay on track

  • Provide training and support to team members to ensure successful i...read more

View 1 answer

Q127. How to audit cash, prepare reconciliation, A/R, PPE assertions type of question asked

Ans.

Auditing cash, preparing reconciliations, and assessing A/R and PPE assertions.

  • Start by obtaining the cash balance from the general ledger and comparing it to the bank statement.

  • Perform bank reconciliations to ensure all transactions are accurately recorded.

  • For accounts receivable, confirm balances with customers and assess the allowance for doubtful accounts.

  • For property, plant, and equipment (PPE), review the depreciation method used and ensure assets are properly valued.

  • Te...read more

Add your answer

Q128. Wha are important feature of service cloud, LWC decorators, events in lwc, asynchronous apex , batch class, flows and its type , experience cloud basics .

Ans.

Service Cloud features, LWC decorators, events, asynchronous apex, batch class, flows, and experience cloud basics.

  • Service Cloud features include case management, knowledge base, omni-channel routing, and service console.

  • LWC decorators are used to add metadata to Lightning web components, such as @api, @track, and @wire.

  • Events in LWC are used for communication between components, such as standard events like onchange and custom events.

  • Asynchronous Apex allows for long-running...read more

Add your answer

Q129. IFRS 16 explanation and why it is amended

Ans.

IFRS 16 is a new accounting standard that requires lessees to recognize assets and liabilities for all leases on their balance sheets.

  • IFRS 16 was amended to improve financial reporting transparency and provide a more accurate representation of a company's financial position.

  • The standard eliminates the distinction between operating and finance leases for lessees, resulting in all leases being recognized on the balance sheet.

  • Under IFRS 16, lessees must recognize a right-of-use ...read more

View 1 answer

Q130. -What is CAPM

Ans.

CAPM stands for Capital Asset Pricing Model, a financial model used to determine the expected return on an investment.

  • CAPM is used to calculate the expected return on an investment based on the risk-free rate, market risk premium, and beta of the asset.

  • It assumes that investors are rational and risk-averse, and that they require compensation for taking on additional risk.

  • The model is widely used in finance and investment management.

  • For example, a portfolio manager may use CAP...read more

Add your answer

Q131. Why do companies use KYC?

Ans.

Companies use KYC to verify the identity of their customers and comply with regulations.

  • KYC helps companies prevent fraud and financial crimes.

  • KYC also helps companies build trust with their customers.

  • KYC is required by law in many countries to prevent money laundering and terrorist financing.

  • KYC can also help companies better understand their customers and tailor their products and services to their needs.

  • Examples of companies that use KYC include banks, insurance companies,...read more

Add your answer

Q132. Explain feature file linking in relation to the step definition file?

Ans.

Feature file linking is the process of connecting feature files with step definition files in BDD testing.

  • Feature files contain scenarios written in Gherkin language

  • Step definition files contain the actual code implementation for the steps in feature files

  • Linking is done by specifying the path to the step definition file in the feature file

  • This allows the automation tool to execute the steps defined in the feature file

Add your answer

Q133. What do you know about servicenow

Ans.

ServiceNow is a cloud-based platform that provides IT service management, IT operations management, and IT business management solutions.

  • ServiceNow offers a range of products and services for IT professionals to streamline and automate their workflows.

  • It helps organizations manage their IT infrastructure, services, and operations more efficiently.

  • ServiceNow's platform includes modules for IT service management, IT operations management, and IT business management.

  • It allows fo...read more

Add your answer

Q134. Regulators and Regulations? Why banks do KYC?

Ans.

Banks do KYC to comply with regulations and prevent financial crimes.

  • KYC helps banks verify the identity of their customers and assess the risk of doing business with them.

  • Regulators require banks to implement KYC procedures to prevent money laundering, terrorist financing, and other financial crimes.

  • KYC also helps banks maintain a good reputation and avoid legal and financial penalties.

  • Examples of KYC regulations include the USA PATRIOT Act, the EU's Fourth Anti-Money Launde...read more

Add your answer

Q135. What do you mean by a shell company?

Ans.

A shell company is a business that exists only on paper and has no significant assets or operations.

  • Shell companies are often used for illegal activities such as money laundering or tax evasion.

  • They can also be used for legitimate purposes such as holding assets or facilitating business transactions.

  • Shell companies typically have minimal employees and physical presence.

  • Examples of shell companies include those set up in tax havens like the Cayman Islands.

  • They may also be used...read more

Add your answer

Q136. What is Change Management and Access Control Management in details with example

Ans.

Change Management involves controlling changes to IT systems, while Access Control Management focuses on managing user access to these systems.

  • Change Management is the process of managing changes to IT systems in a controlled and systematic manner.

  • Access Control Management involves managing user access to IT systems, ensuring only authorized users have access to specific resources.

  • Change Management includes steps like planning, testing, implementing, and documenting changes t...read more

Add your answer

Q137. What are the fundamental concepts of security?

Ans.

Fundamental concepts of security include confidentiality, integrity, availability, authentication, and authorization.

  • Confidentiality: Ensuring that information is only accessible to those who are authorized to view it.

  • Integrity: Ensuring that data is accurate, complete, and has not been tampered with.

  • Availability: Ensuring that information and resources are accessible when needed.

  • Authentication: Verifying the identity of users or systems accessing information.

  • Authorization: G...read more

Add your answer

Q138. What steps are involved in fetching data from an on-premises Unix server?

Ans.

Steps involved in fetching data from an on-premises Unix server

  • Establish a secure connection to the Unix server using SSH or other protocols

  • Identify the data source on the Unix server and determine the data extraction method

  • Use tools like SCP, SFTP, or rsync to transfer the data from the Unix server to Azure storage

  • Transform the data as needed before loading it into Azure Data Lake or Azure SQL Database

Add your answer

Q139. What contributions have you made to the framework?

Ans.

I have contributed to the framework by designing and implementing new test cases, improving existing test scripts, and enhancing automation capabilities.

  • Designed and implemented new test cases to cover additional functionalities

  • Improved existing test scripts for better efficiency and coverage

  • Enhanced automation capabilities by integrating new tools and technologies

  • Collaborated with developers to identify and resolve issues in the framework

Add your answer

Q140. How do you manage dynamic elements on a webpage?

Ans.

Dynamic elements on a webpage are managed using various techniques like waiting for element visibility, using explicit waits, and handling AJAX calls.

  • Use explicit waits to wait for the element to be present, visible, clickable, etc.

  • Use dynamic locators like XPath, CSS selectors, or relative locators to locate elements that change dynamically.

  • Handle AJAX calls by waiting for the call to complete before interacting with the element.

  • Use frameworks like Selenium WebDriver to inte...read more

Add your answer

Q141. What is the structure of a framework? Explain.

Ans.

A framework is a structured set of guidelines, libraries, and tools used to develop and test software applications.

  • A framework provides a foundation for building software applications by defining the overall structure and design patterns.

  • It includes reusable components, libraries, and utilities that help in automating tasks and improving efficiency.

  • Frameworks can be categorized into different types such as testing frameworks, web application frameworks, and mobile app framewo...read more

Add your answer

Q142. What do you know about Cloud Computing?

Ans.

Cloud computing is the delivery of computing services over the internet, including servers, storage, databases, networking, software, analytics, and intelligence.

  • Cloud computing allows users to access and store data and applications on remote servers instead of on their local devices.

  • It offers scalability, flexibility, cost-effectiveness, and the ability to access resources from anywhere with an internet connection.

  • Examples of cloud computing services include Amazon Web Servi...read more

Add your answer

Q143. Do you know Wireless Communication System?

Ans.

Yes, I am familiar with Wireless Communication Systems.

  • I have experience with setting up and securing Wi-Fi networks

  • I understand different wireless protocols such as Bluetooth, NFC, and Zigbee

  • I am knowledgeable about wireless security measures like WPA2 encryption

  • I have worked with mobile devices and their wireless capabilities

Add your answer

Q144. Write client script of populate caller's manager name deptmant name in the description field

Ans.

Use client script to populate caller's manager and department names in the description field.

  • Create a client script that triggers on the 'Caller' field change event.

  • Retrieve the caller's manager and department names from the user record.

  • Set the description field value to include the caller's manager and department names.

  • Ensure the client script runs smoothly without errors.

Add your answer

Q145. Difference between ADLS gen 1 and gen 2?

Ans.

ADLS gen 2 is an upgrade to gen 1 with improved performance, scalability, and security features.

  • ADLS gen 2 is built on top of Azure Blob Storage, while gen 1 is a standalone service.

  • ADLS gen 2 supports hierarchical namespace, which allows for better organization and management of data.

  • ADLS gen 2 has better performance for large-scale analytics workloads, with faster read and write speeds.

  • ADLS gen 2 has improved security features, including encryption at rest and in transit.

  • AD...read more

Add your answer

Q146. NPV and IRR, when to use what?

Ans.

NPV is used to determine the present value of future cash flows, while IRR is used to determine the rate of return on an investment.

  • Use NPV when comparing projects with different cash flow patterns

  • Use IRR when comparing projects with similar cash flow patterns

  • NPV assumes reinvestment at the cost of capital, while IRR assumes reinvestment at the IRR rate

  • NPV is more accurate when cash flows are certain, while IRR is more useful when cash flows are uncertain

  • Example: Use NPV to c...read more

Add your answer

Q147. how do you copy data from on-premise to azure cloud

Ans.

Data can be copied from on-premise to Azure cloud using various methods like Azure Data Factory, Azure Storage Explorer, Azure Data Migration Service, etc.

  • Use Azure Data Factory to create data pipelines for moving data from on-premise to Azure cloud

  • Utilize Azure Storage Explorer to manually copy data from on-premise to Azure Blob Storage

  • Leverage Azure Data Migration Service for migrating large volumes of data from on-premise databases to Azure SQL Database

  • Consider using Azure...read more

Add your answer

Q148. what is circular linked list?

Ans.

A circular linked list is a linked list where the last node points to the first node, forming a loop.

  • Each node has a pointer to the next node and the last node points to the first node.

  • Traversal can start from any node and continue until the starting node is reached again.

  • Used in applications where data needs to be accessed in a circular manner, such as a playlist in music apps.

Add your answer

Q149. Various financial reporting standards

Ans.

Financial reporting standards vary by country and industry, with some of the most common being GAAP, IFRS, and SEC regulations.

  • GAAP (Generally Accepted Accounting Principles) is used in the United States

  • IFRS (International Financial Reporting Standards) is used in many countries around the world

  • SEC (Securities and Exchange Commission) regulations apply to publicly traded companies in the United States

  • Other standards include ASPE (Accounting Standards for Private Enterprises) ...read more

Add your answer

Q150. What are the major components while drafting a change plan?

Ans.

Major components of a change plan include stakeholder analysis, communication strategy, risk assessment, implementation timeline, and evaluation metrics.

  • Stakeholder analysis: Identify key stakeholders and their roles in the change process.

  • Communication strategy: Develop a plan for how information about the change will be shared with stakeholders.

  • Risk assessment: Identify potential risks and develop strategies to mitigate them.

  • Implementation timeline: Create a detailed timelin...read more

Add your answer

Q151. Explain what you are doing in your currect profile?

Ans.

I am currently working as a Risk Consultant, where I assess and analyze potential risks for clients to help them make informed decisions.

  • Conducting risk assessments to identify potential threats and vulnerabilities

  • Analyzing data to evaluate the likelihood and impact of risks

  • Developing risk mitigation strategies and recommendations for clients

  • Communicating findings and recommendations to clients and stakeholders

Add your answer

Q152. what is the financial posting after invoices gets posted?

Ans.

Financial posting after invoices are posted includes updating the general ledger and accounts payable/receivable.

  • Invoices are typically posted to accounts payable or accounts receivable

  • General ledger is updated with the transaction details

  • Accounts payable/receivable balances are adjusted accordingly

Add your answer

Q153. What are the differences between component event and application event?

Ans.

Component events are fired and handled by a single component, while application events are fired and handled by multiple components.

  • Component events are used for communication between components within a single application.

  • Application events are used for communication between components across multiple applications.

  • Component events are fired using fireEvent() method, while application events are fired using $A.get('e.namespace:eventName').fire() method.

  • Component events are ha...read more

Add your answer

Q154. What is Pep screening ?

Ans.

PEP screening is a process used to identify potential employees who are likely to be successful in a particular role.

  • PEP screening involves assessing candidates based on their skills, experience, and personality traits.

  • It helps employers make informed hiring decisions and reduce turnover rates.

  • Examples of PEP screening methods include behavioral assessments, cognitive tests, and job simulations.

Add your answer

Q155. -Formula of FCFF and FCFE

Ans.

FCFF and FCFE are formulas used in finance to calculate cash flow available to investors and equity holders respectively.

  • FCFF = Operating Cash Flow - Capital Expenditures + Net Borrowing

  • FCFE = Net Income - (Capital Expenditures - Depreciation) - Change in Working Capital + Net Borrowing

  • FCFF is used to determine the cash flow available to all investors, while FCFE is used to determine the cash flow available to equity holders

  • Both formulas are important in determining a company...read more

Add your answer

Q156. What are your current responsibilities as Azure Data Engineer

Ans.

As an Azure Data Engineer, my current responsibilities include designing and implementing data solutions on Azure, optimizing data storage and processing, and ensuring data security and compliance.

  • Designing and implementing data solutions on Azure

  • Optimizing data storage and processing for performance and cost efficiency

  • Ensuring data security and compliance with regulations

  • Collaborating with data scientists and analysts to support their data needs

Add your answer

Q157. 2) How will you test Cost of sales WP?

Ans.

Cost of sales WP can be tested by analyzing the expenses incurred in producing and delivering the product or service.

  • Review the cost of raw materials and labor involved in production

  • Analyze the cost of shipping and delivery

  • Compare the cost of sales to revenue generated

  • Check for any discrepancies or anomalies in the data

  • Consider industry benchmarks and trends

Add your answer

Q158. What is the process of designing a c&b strategy ?

Ans.

Designing a c&b strategy involves analyzing market trends, defining objectives, creating policies, and implementing programs.

  • Conduct a thorough analysis of market trends and compensation practices

  • Define clear objectives and align them with the company's goals

  • Create policies that are fair, competitive, and compliant with legal requirements

  • Implement programs that support the company's culture and values

  • Regularly review and adjust the strategy to ensure its effectiveness

Add your answer

Q159. Journal entry for depreciation of an asset

Ans.

Depreciation of an asset is recorded in a journal entry to allocate the cost of the asset over its useful life.

  • Debit the Depreciation Expense account to recognize the expense

  • Credit the Accumulated Depreciation account to reduce the asset's carrying amount

  • Include the date, description of the asset, amount of depreciation, and any relevant calculations

  • Journal entry should follow the double-entry accounting system

Add your answer

Q160. What is Semantic layer?

Ans.

Semantic layer is a virtual layer that provides a simplified view of complex data.

  • It acts as a bridge between the physical data and the end-user.

  • It provides a common business language for users to access data.

  • It simplifies data access by hiding the complexity of the underlying data sources.

  • Examples include OLAP cubes, data marts, and virtual tables.

Add your answer

Q161. Did you know anything about micro communication

Ans.

Micro communication refers to the exchange of information through small, discreet channels or devices.

  • Micro communication can involve technologies such as microphones, earpieces, and hidden cameras.

  • It is often used in espionage, surveillance, and security operations.

  • Examples include covert agents communicating with a handler via a hidden earpiece, or a spy transmitting information through a concealed microphone.

Add your answer

Q162. What all the requirements you worked in enhancements

Ans.

I have worked on various requirements in enhancements.

  • Implemented custom logic to enhance standard SAP functionality

  • Developed user exits and BAdIs to add additional functionality

  • Enhanced existing reports and forms to meet specific business requirements

  • Integrated external systems with SAP using enhancement techniques

  • Worked on performance enhancements to optimize system performance

Add your answer

Q163. How to explain the functionality of PO to Customer

Ans.

A Purchase Order (PO) is a document issued by a buyer to a seller, outlining the details of goods or services to be purchased.

  • Explain that a PO is a legally binding document that specifies the quantity, price, and terms of the purchase

  • Mention that the PO helps both parties track and manage the order, ensuring timely delivery and payment

  • Highlight that the PO serves as a reference for resolving any disputes or discrepancies in the transaction

Add your answer

Q164. Cryptography Encryption types of encryption

Ans.

Cryptography encryption involves various types of encryption algorithms to secure data.

  • Symmetric encryption uses a single key for both encryption and decryption (e.g. AES)

  • Asymmetric encryption uses a pair of keys, public and private, for encryption and decryption (e.g. RSA)

  • Hash functions generate fixed-size output from input data (e.g. SHA-256)

  • Stream ciphers encrypt data bit by bit (e.g. RC4)

  • Block ciphers encrypt data in fixed-size blocks (e.g. DES)

Add your answer

Q165. Would you like to take up tax roles if audit is not available

Ans.

Yes, I am open to taking up tax roles if audit opportunities are not available.

  • I have a strong foundation in accounting principles and tax regulations

  • I am willing to learn and adapt to new roles and responsibilities

  • Taking up tax roles can provide me with valuable experience and broaden my skill set

Add your answer

Q166. Why is due diligence necessary?

Ans.

Due diligence is necessary to assess risks, verify information, and make informed decisions.

  • To identify potential risks and liabilities associated with a business transaction or investment.

  • To verify the accuracy of information provided by the other party.

  • To evaluate the financial health and performance of a company.

  • To ensure compliance with legal and regulatory requirements.

  • To make informed decisions based on reliable and comprehensive information.

  • Example: Conducting due dili...read more

Add your answer

Q167. When should revenue be recognised in case of ex work inco term

Ans.

Revenue should be recognized in case of ex work inco term when the risks and rewards of ownership have been transferred to the buyer.

  • Revenue should be recognized when the seller has completed its obligations under the ex work inco term.

  • The transfer of risks and rewards of ownership to the buyer is a key factor in determining when revenue should be recognized.

  • The seller should have no significant continuing involvement or control over the goods after they have been delivered t...read more

Add your answer

Q168. What challenges did you encounter during the audit process?

Ans.

Challenges faced during the audit process included lack of cooperation from certain departments, incomplete documentation, and tight deadlines.

  • Lack of cooperation from certain departments made it difficult to obtain necessary information for the audit.

  • Incomplete documentation required additional time and effort to gather missing information.

  • Tight deadlines added pressure to complete the audit within a limited timeframe.

Add your answer

Q169. What is internal Audit and tell me its complete process

Ans.

Internal Audit is a systematic and independent evaluation of an organization's operations to ensure effectiveness, efficiency, and compliance.

  • Planning: Define scope, objectives, and methodology of the audit.

  • Fieldwork: Collect and analyze data, identify risks and controls.

  • Reporting: Communicate findings, recommendations, and action plans.

  • Follow-up: Monitor implementation of recommendations and track progress.

  • Examples: Performing financial audits, operational audits, compliance...read more

Add your answer

Q170. What is OFAC and FATCA? CDD and EDD?

Ans.

OFAC and FATCA are regulations related to financial compliance. CDD and EDD are customer due diligence and enhanced due diligence processes.

  • OFAC (Office of Foreign Assets Control) is a US government agency that enforces economic and trade sanctions against countries, organizations, and individuals involved in terrorism, narcotics trafficking, and other illegal activities.

  • FATCA (Foreign Account Tax Compliance Act) is a US law that requires foreign financial institutions to rep...read more

Add your answer

Q171. How corporate kyc works

Ans.

Corporate KYC is the process of verifying the identity of a company and its beneficial owners.

  • The company must provide documentation such as incorporation papers, business licenses, and tax identification numbers.

  • Beneficial owners must also be identified and verified through documentation such as passports or government-issued IDs.

  • The KYC process helps prevent money laundering, terrorist financing, and other illegal activities.

  • Financial institutions and other regulated entiti...read more

Add your answer

Q172. What actually needs to do programming?

Ans.

Programming is the process of writing instructions for a computer to perform specific tasks.

  • Programming involves writing code using programming languages.

  • It requires problem-solving skills to break down complex problems into smaller, manageable tasks.

  • Programmers need to understand algorithms and data structures to optimize code efficiency.

  • Debugging and testing are essential to identify and fix errors in the code.

  • Continuous learning and staying updated with new technologies ar...read more

View 1 answer

Q173. Guesstimate to estimate number of if tyres sold in a year

Ans.

Estimate the number of car tyres sold in a year

  • Consider the total number of cars on the road

  • Assume an average tyre lifespan and replacement frequency

  • Factor in seasonal variations and regional differences

  • Consult industry reports and market trends

  • Approximately 1.5 billion car tyres are sold globally each year

Add your answer

Q174. How will you recognise revenue in service industries

Ans.

Revenue recognition in service industries depends on the type of service provided and the terms of the contract.

  • Recognize revenue when the service is completed and the customer is billed

  • Recognize revenue over time if the service is ongoing and the customer is billed periodically

  • Recognize revenue when the service is delivered if payment is received in advance

  • Recognize revenue based on percentage of completion if the service is long-term and complex

  • Consider any warranties or gu...read more

Add your answer

Q175. What is difference between actual costing and standard costing

Ans.

Actual costing is based on the actual costs incurred, while standard costing uses predetermined costs for materials, labor, and overhead.

  • Actual costing uses actual costs incurred for materials, labor, and overhead, providing a more accurate reflection of costs.

  • Standard costing uses predetermined costs for materials, labor, and overhead, allowing for easier budgeting and cost control.

  • Actual costing is more time-consuming and complex to calculate compared to standard costing.

  • Ac...read more

Add your answer

Q176. Tell me about golden rules of accountancy

Ans.

Golden rules of accountancy are basic principles that guide the process of recording financial transactions.

  • There are three golden rules of accountancy: Debit the receiver, Credit the giver; Debit what comes in, Credit what goes out; Debit all expenses and losses, Credit all incomes and gains.

  • These rules help ensure that financial transactions are recorded accurately and consistently.

  • For example, when a company receives cash from a customer, the cash account is debited (incre...read more

Add your answer

Q177. What are the parametrics each manager should follow?

Ans.

Managers should follow key parametrics such as communication, goal setting, team development, and performance evaluation.

  • Communication: Regularly communicate with team members to ensure clarity and alignment.

  • Goal setting: Set clear and achievable goals for the team and individuals.

  • Team development: Invest in training and development opportunities for team members.

  • Performance evaluation: Conduct regular performance reviews and provide feedback for improvement.

Add your answer

Q178. What are the regulators for AML, KYC and CTF?

Ans.

Regulators for AML, KYC and CTF include FinCEN, FATF, and local regulatory authorities.

  • Financial Crimes Enforcement Network (FinCEN) - U.S. regulatory agency responsible for combating money laundering and terrorist financing.

  • Financial Action Task Force (FATF) - International organization that sets standards and promotes effective implementation of measures to combat money laundering and terrorist financing globally.

  • Local regulatory authorities - Each country may have its own ...read more

Add your answer

Q179. Do you CI/CD pipeline

Ans.

Yes, I am familiar with CI/CD pipelines and have experience implementing them in projects.

  • I have experience setting up CI/CD pipelines using tools like Jenkins, GitLab CI, or CircleCI.

  • I understand the importance of automation in the software development process.

  • I have worked on integrating automated testing and deployment processes into CI/CD pipelines.

  • I am familiar with concepts like continuous integration, continuous delivery, and continuous deployment.

Add your answer

Q180. Type pf PO and Transfers in Oracle Retail Merchandising Module

Ans.

Purchase Orders (PO) and Transfers are types of transactions in Oracle Retail Merchandising Module.

  • Purchase Orders (PO) are used to order merchandise from vendors.

  • Transfers are used to move merchandise between stores or warehouses.

  • POs can be created manually or automatically based on reorder points.

  • Transfers can be initiated to balance inventory levels or fulfill customer demand.

Add your answer

Q181. Do you know anything about Indian Tax?

Ans.

Yes, Indian Tax system is complex and diverse with various taxes like income tax, GST, customs duty, etc.

  • Indian tax system is governed by the Central Board of Direct Taxes (CBDT) and the Central Board of Indirect Taxes and Customs (CBIC)

  • Income tax is levied on the income earned by individuals and businesses

  • Goods and Services Tax (GST) is a value-added tax levied on the supply of goods and services

  • Customs duty is levied on goods imported into India

  • There are also other taxes li...read more

Add your answer

Q182. Do you have any prior experience in internal auditing

Ans.

Yes, I have 5 years of experience in internal auditing in the banking industry.

  • I have 5 years of experience in internal auditing in the banking industry

  • Conducted regular audits to ensure compliance with regulations

  • Identified and addressed financial risks within the organization

  • Prepared detailed audit reports for management review

Add your answer

Q183. Do you have idea about how the cloud works?

Ans.

Cloud computing involves storing and accessing data and programs over the internet instead of on a computer's hard drive.

  • Cloud computing allows users to access data and applications from any device with an internet connection.

  • It provides scalability, flexibility, and cost-efficiency for businesses.

  • Examples of cloud services include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.

Add your answer

Q184. Self introduction What is AML, KYC and Sanction Screening

Ans.

AML, KYC and Sanction Screening are measures taken by financial institutions to prevent money laundering, terrorist financing and other illegal activities.

  • AML stands for Anti-Money Laundering and refers to the policies, procedures and regulations put in place by financial institutions to prevent, detect and report money laundering activities.

  • KYC stands for Know Your Customer and refers to the process of verifying the identity of a customer before providing them with financial...read more

Add your answer

Q185. What is DCF model ?

Ans.

DCF model is a valuation method used to estimate the value of an investment based on its future cash flows.

  • DCF stands for Discounted Cash Flow

  • It involves projecting future cash flows and discounting them back to their present value

  • The discount rate used is typically the cost of capital or required rate of return

  • It is commonly used in finance to value stocks, bonds, and other investments

Add your answer

Q186. how would you improve the claims process an Insurance clients?

Ans.

Implementing automation, streamlining processes, enhancing communication with clients.

  • Implement automation to reduce manual errors and speed up processing times

  • Streamline processes to eliminate unnecessary steps and improve efficiency

  • Enhance communication with clients through regular updates and personalized interactions

Add your answer

Q187. Difference between limitation of liability and indemnfication clause

Ans.

Limitation of liability caps the maximum amount a party can be liable for, while indemnification clause requires one party to compensate the other for losses.

  • Limitation of liability sets a maximum cap on the amount of damages a party can be liable for in case of breach or negligence.

  • Indemnification clause requires one party to compensate the other for losses, damages, or liabilities incurred as a result of a specific event or action.

  • Limitation of liability is often used to li...read more

Add your answer

Q188. What is sanctions and sanction screening?

Ans.

Sanctions are penalties imposed on individuals, entities, or countries to enforce international laws or policies. Sanction screening is the process of checking individuals or entities against sanction lists to ensure compliance.

  • Sanctions are penalties imposed on individuals, entities, or countries for violating international laws or policies.

  • Sanctions can include financial restrictions, trade embargoes, travel bans, and asset freezes.

  • Sanction screening involves checking indiv...read more

View 1 answer

Q189. Prepare a ppt based on topic's internet search within 30 minutes and present

Ans.

Prepare a ppt on internet search topic in 30 minutes and present

  • Research the topic thoroughly using reliable sources

  • Create a clear outline for the presentation

  • Include relevant images, graphs, and statistics to support your points

  • Practice your presentation to ensure smooth delivery

Add your answer

Q190. How do you mitigate those risks identified?

Ans.

To mitigate identified risks, we implement risk management strategies, create contingency plans, conduct regular risk assessments, and ensure proper communication.

  • Implement risk management strategies such as risk avoidance, risk reduction, risk transfer, and risk acceptance.

  • Create contingency plans to address potential risks and minimize their impact.

  • Conduct regular risk assessments to identify new risks and evaluate the effectiveness of existing risk mitigation measures.

  • Ensu...read more

Add your answer

Q191. How to initiate Sparkcontext

Ans.

To initiate Sparkcontext, create a SparkConf object and pass it to SparkContext constructor.

  • Create a SparkConf object with app name and master URL

  • Pass the SparkConf object to SparkContext constructor

  • Example: conf = SparkConf().setAppName('myApp').setMaster('local[*]') sc = SparkContext(conf=conf)

  • Stop SparkContext using sc.stop()

Add your answer

Q192. What is transfer pricing? Which forms are used for filing? Methods in transfer pricing

Ans.

Transfer pricing is the setting of prices for goods and services sold between related entities within an organization.

  • Transfer pricing is used to determine the prices at which goods and services are transferred between related entities within a company.

  • Forms such as Form 5471, Form 8865, and Form 8858 are commonly used for filing transfer pricing documentation.

  • Common methods in transfer pricing include comparable uncontrolled price (CUP), cost plus, resale price, and profit s...read more

Add your answer

Q193. Which domain? What is service now?

Add your answer

Q194. What are the levels in FAS157

Ans.

FAS157 has three levels: Level 1 - quoted prices in active markets, Level 2 - observable inputs, Level 3 - unobservable inputs.

  • Level 1: Quoted prices in active markets

  • Level 2: Observable inputs

  • Level 3: Unobservable inputs

Add your answer

Q195. Why material Ledger mandatory in s/4hana?

Ans.

Material Ledger is mandatory in S/4HANA for accurate valuation of inventory and cost of goods sold.

  • Material Ledger provides real-time, multi-dimensional valuation of inventory

  • It allows for parallel valuation in different currencies and valuation views

  • Enables accurate calculation of actual costs for materials using actual costing method

  • Supports transfer pricing and profit center valuation

Add your answer

Q196. What is the sales and procurement process?

Ans.

Sales and procurement process involves the steps taken to acquire goods or services from suppliers and sell them to customers.

  • Sales process involves identifying leads, converting them to opportunities, creating quotes, and closing deals.

  • Procurement process involves identifying needs, selecting suppliers, negotiating contracts, and receiving goods/services.

  • Both processes involve order processing, invoicing, and payment.

  • Integration with inventory management and financial system...read more

Add your answer

Q197. What is Vulnerability?

Ans.

Vulnerability is the state of being open to harm, attack, or damage.

  • Vulnerability refers to the susceptibility to physical, emotional, or psychological harm.

  • It can also refer to weaknesses or gaps in security systems that can be exploited by attackers.

  • Being vulnerable can also mean being open and honest about one's feelings or struggles.

  • Examples include a child being vulnerable to bullying, a computer system vulnerable to hacking, or a person vulnerable to heartbreak.

Add your answer

Q198. On python Code for sum of digit Palindrome or not

Ans.

Python code for finding sum of digits and checking if a number is palindrome or not.

  • To find sum of digits, convert the number to string and iterate over each character to add them up

  • To check if a number is palindrome, convert the number to string and compare it with its reverse

  • Alternatively, you can also convert the number to a list of digits and check if it is equal to its reverse

Add your answer

Q199. Journal entry for purchase of an asset

Ans.

Journal entry for purchase of an asset involves debiting the asset account and crediting the cash or accounts payable account.

  • Debit the asset account for the cost of the asset

  • Credit the cash or accounts payable account for the same amount

  • Include a description of the asset purchased in the journal entry

  • Ensure the entry follows the double-entry accounting system

Add your answer

Q200. Explanation of Real time project flow

Ans.

Real time project flow refers to the sequence of events and processes that occur in a project as they happen, without any delay.

  • Real time data collection and analysis

  • Immediate decision-making based on current information

  • Continuous monitoring and updates

  • Quick response to changes or issues

  • Examples: Stock market trading, online customer support systems

Add your answer
1
2
3
4
5
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Honda Motorcycle & Scooter

based on 632 interviews
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.4
 • 450 Interview Questions
4.1
 • 401 Interview Questions
3.9
 • 246 Interview Questions
4.1
 • 217 Interview Questions
3.6
 • 182 Interview Questions
3.6
 • 144 Interview Questions
View all
Top KPMG India Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter