KPMG India
400+ Bharat Ratna Indira Gandhi College Engineering Interview Questions and Answers
Q201. Explanation of Real time project flow
Real time project flow refers to the sequence of events and processes that occur in a project as they happen, without any delay.
Real time data collection and analysis
Immediate decision-making based on current information
Continuous monitoring and updates
Quick response to changes or issues
Examples: Stock market trading, online customer support systems
Q202. What is due diligence?
Due diligence is the process of investigating and evaluating a business or person before entering into a contract or agreement.
Involves gathering and analyzing relevant information
Helps in assessing risks and opportunities
Ensures compliance with regulations and standards
Common in mergers and acquisitions, investments, and partnerships
Q203. What is money laundering?
Money laundering is the illegal process of making large amounts of money generated by a criminal activity, such as drug trafficking or terrorist funding, appear to have come from a legitimate source.
Money laundering involves disguising the origins of illegally obtained money by passing it through a complex sequence of banking transfers or commercial transactions.
It typically involves three stages: placement, layering, and integration.
Examples of money laundering include purch...read more
Q204. Peer benchmarking of Gold's Gym in India
Peer benchmarking of Gold's Gym in India involves comparing its performance and offerings with other similar fitness centers in the country.
Compare membership fees and packages offered by Gold's Gym with its competitors
Analyze the range of equipment and facilities available at Gold's Gym compared to other gyms
Evaluate customer reviews and satisfaction levels to understand how Gold's Gym ranks among peers
Q205. 2) what is accounting
Accounting is the process of recording, classifying, and summarizing financial transactions to provide information that is useful in making business decisions.
Accounting involves keeping track of financial transactions such as sales, purchases, and payments
It includes classifying these transactions into categories such as assets, liabilities, and equity
The information is then summarized in financial statements such as balance sheets and income statements
Examples of accounting...read more
Q206. How do you do income allocation in 704c method?
Income allocation in 704c method involves assigning income or deductions to partners based on their share of partnership profits.
Income allocation in 704c method is used to allocate income or deductions to partners in a partnership based on their share of partnership profits.
This method is typically used when there is a substantial disparity between the book value and tax basis of partnership assets.
The allocation is made in a manner that prevents the shifting of tax liabilit...read more
Q207. DIfference between consolidated and combined returns
Consolidated returns include all subsidiaries while combined returns only include affiliated companies.
Consolidated returns combine the financial statements of a parent company and all its subsidiaries into one report.
Combined returns only include the financial statements of affiliated companies, which are those that have a significant ownership interest in each other.
Consolidated returns are required for companies that own more than 50% of another company's stock, while comb...read more
Q208. Difference between information security and cyber security?
Information security focuses on protecting all forms of data, while cyber security specifically deals with protecting digital information from cyber threats.
Information security encompasses all aspects of data protection, including physical and digital forms.
Cyber security specifically deals with protecting digital information from cyber threats such as hacking, malware, and phishing attacks.
Examples of information security measures include encryption, access control, and dat...read more
Q209. Explain React hooks. Give a use case of any of the hooks
React hooks are functions that let you use state and other React features without writing a class.
Hooks are introduced in React 16.8 to allow developers to use state and other React features in functional components.
useState is a commonly used hook for managing state in functional components.
useEffect is another popular hook used for side effects in functional components.
One use case of useState hook is to manage a counter in a functional component.
Q210. Do you know about GST?
Yes, GST stands for Goods and Services Tax.
GST is a tax system implemented in India in 2017.
It replaced multiple indirect taxes like VAT, excise duty, etc.
It is a destination-based tax system, meaning the tax is collected where the goods or services are consumed.
There are four tax slabs under GST - 5%, 12%, 18%, and 28%.
GST has simplified the tax system and made it easier for businesses to comply with tax regulations.
Q211. Difference between .Tostring() and Convert.Tostring()
Convert.ToString() is a static method that handles null values, while .ToString() is an instance method that may throw a NullReferenceException.
Convert.ToString() is a static method that can handle null values and return an empty string if the input is null.
.ToString() is an instance method that is called on an object and may throw a NullReferenceException if the object is null.
Example: string s = null; Convert.ToString(s) will return an empty string, while s.ToString() will ...read more
Q212. Explain the intercompany process
Intercompany process involves transactions between two or more entities within the same organization.
Intercompany process is used to transfer goods or services between different entities of the same company
It involves creating intercompany sales orders, intercompany purchase orders, intercompany billing documents, and intercompany deliveries
The process ensures that the transactions are properly recorded in the books of accounts of each entity
It also involves reconciling inter...read more
Q213. PROCESS OF INTERNAL AUDIT
Internal audit is a systematic and independent examination of a company's financial and operational activities.
Internal audit is conducted by an independent team within the organization.
The team evaluates the effectiveness of internal controls, risk management, and governance processes.
The audit process involves planning, fieldwork, reporting, and follow-up.
The team identifies areas of improvement and provides recommendations to management.
Examples of areas audited include fi...read more
Q214. Give a practical example of common control business combination.
A common control business combination occurs when two or more businesses are under the control of the same parent company.
In a common control business combination, the parent company has the ability to direct the operating and financial policies of the businesses.
This type of combination typically involves businesses that are owned by the same group of shareholders or have the same management team.
Common control business combinations are not considered to be acquisitions beca...read more
Q215. What is the defect life cycle?
Defect life cycle is the process of identifying, reporting, fixing, retesting, and closing defects in software development.
Defect identification: Defects are identified through testing or user feedback.
Defect reporting: Defects are reported in a defect tracking system with details like severity and priority.
Defect fixing: Developers fix the reported defects based on the information provided.
Defect retesting: Testers verify that the fixed defects are resolved.
Defect closing: O...read more
Q216. Explain about technical settings in the data dictionary
Technical settings in the data dictionary are used to define the structure and behavior of database objects in SAP ABAP.
Technical settings include attributes like data type, length, and decimal places for fields in database tables.
They also include settings for key fields, indexes, and foreign key relationships.
Technical settings can be used to enforce data integrity and optimize performance.
Examples of technical settings in the data dictionary include defining a field as a d...read more
Q217. How many types of sorting and searching?
There are two types of sorting - ascending and descending. There are various types of searching like linear search, binary search, etc.
Sorting: Ascending, Descending
Searching: Linear search, Binary search, Hashing, etc.
Q218. What is Kyc? What is AML?
KYC stands for Know Your Customer, which is a process of verifying the identity of a customer. AML stands for Anti-Money Laundering, which is a set of laws, regulations, and procedures aimed at preventing criminals from disguising illegally obtained funds as legitimate income.
KYC is a process of collecting and verifying customer information, such as name, address, and identification documents.
KYC helps financial institutions to assess the risk of doing business with a particu...read more
Q219. SQL to convert case to upper Union and Union all Decorators Generators
SQL query to convert case to upper, Union and Union all, Decorators, Generators
Use the UPPER() function in SQL to convert case to upper
UNION combines the result sets of two or more SELECT statements
UNION ALL also combines the result sets of two or more SELECT statements, including duplicates
Decorators in Python are used to modify or extend the behavior of functions or methods
Generators in Python are functions that return an iterator object
Q220. how cicd pipeline works
CI/CD pipeline automates the process of integrating code changes, testing them, and deploying to production.
CI/CD stands for Continuous Integration/Continuous Deployment
It involves automating the steps of building, testing, and deploying code changes
Tools like Jenkins, GitLab CI/CD, and CircleCI are commonly used for setting up CI/CD pipelines
Developers commit code changes to a version control system, triggering the pipeline to start
Automated tests are run to ensure code qual...read more
Q221. 3. Explain detail project architecture
The project architecture involves the design and organization of data pipelines and systems for efficient data processing and storage.
The architecture includes components such as data sources, data processing frameworks, storage systems, and data delivery mechanisms.
It focuses on scalability, reliability, and performance to handle large volumes of data.
Example: A project architecture may involve using Apache Kafka for real-time data ingestion, Apache Spark for data processing...read more
Q222. How can you add CSS in HTML in three ways.
CSS can be added in HTML using inline, internal, and external methods.
Inline CSS: Use the style attribute within an HTML element.
Internal CSS: Use the <style> tag within the <head> section of the HTML document.
External CSS: Link an external CSS file using the <link> tag within the <head> section.
Q223. what is integration run time in adf
Integration run time in ADF is a compute infrastructure used to run activities in Azure Data Factory pipelines.
Integration run time is a managed compute infrastructure in Azure Data Factory.
It is used to run activities within pipelines, such as data movement or data transformation tasks.
Integration run time can be auto-scaled based on the workload requirements.
It supports various data integration scenarios, including batch processing and real-time data processing.
Examples of ...read more
Q224. Explain the Software Testing Lifecycle
The Software Testing Lifecycle is a process that includes planning, designing, executing, and evaluating tests to ensure software quality.
1. Planning phase involves defining test objectives, scope, and resources.
2. Design phase includes creating test cases, test data, and test environment setup.
3. Execution phase involves running tests, reporting defects, and retesting.
4. Evaluation phase includes analyzing test results, identifying trends, and improving testing processes.
5. ...read more
Q225. What are the components involved in FRS
FRS stands for Functional Requirements Specification and involves components such as user requirements, functional requirements, and non-functional requirements.
User requirements: Describes what the user expects from the system
Functional requirements: Describes what the system should do
Non-functional requirements: Describes how the system should perform
Other components may include system architecture, design constraints, and testing requirements
Q226. What are financials how many financial
Financials refer to the financial statements of a company that provide information about its financial performance.
Financials include the income statement, balance sheet, and cash flow statement.
They provide information about a company's revenue, expenses, assets, liabilities, and cash flow.
Financials are used by investors, analysts, and other stakeholders to evaluate a company's financial health and performance.
Examples of financials include annual reports, quarterly reports...read more
Q227. Disclosures in financial statements
Disclosures in financial statements are important for transparency and to provide relevant information to stakeholders.
Disclosures provide information about accounting policies, estimates, and judgments used in preparing financial statements.
They also disclose information about significant events or transactions that may impact the financial position of the company.
Examples of disclosures include notes to the financial statements, management commentary, and auditor's report.
D...read more
Q228. Different aspects of security like application and infrastructure.
Security aspects like application and infrastructure are crucial for risk management.
Application security involves securing software applications from threats like malware and unauthorized access.
Infrastructure security focuses on protecting the underlying IT infrastructure, including networks, servers, and databases.
Both aspects are essential for comprehensive risk management in organizations.
Examples of application security measures include encryption, access controls, and ...read more
Q229. Documents required to authenticate Partnership
Partnership documents include partnership agreement, certificate of formation, and proof of identity for partners.
Partnership agreement outlining roles and responsibilities of partners
Certificate of formation proving the existence of the partnership
Proof of identity for all partners such as passports or driver's licenses
Q230. Find the pattern from given string
The pattern in the given string needs to be identified.
Look for repeating sequences of characters
Check for any numerical or alphabetical patterns
Consider the length of the string and any special characters present
Q231. Difference Between 179 expense and Bonus Depreciation
179 expense and Bonus Depreciation are both tax deductions for business assets, but differ in their application and limitations.
179 expense allows businesses to deduct the full cost of qualifying assets in the year they are purchased, up to a certain limit.
Bonus Depreciation allows businesses to deduct a percentage of the cost of qualifying assets in the year they are purchased, with no limit.
179 expense is limited to $1,050,000 for 2021, while Bonus Depreciation is set at 10...read more
Q232. Roaming scneario for billing a customer
Roaming scenario for billing a customer involves charging for services used outside of their home network.
Roaming charges are applied when a customer uses their phone outside of their home network.
Different rates may apply depending on the location and network used.
Roaming charges can include voice calls, text messages, and data usage.
Customers may have the option to purchase a roaming package for discounted rates.
It is important to clearly communicate roaming charges to cust...read more
Q233. What are basic principle of oops
The basic principles of OOPs are encapsulation, inheritance, and polymorphism.
Encapsulation: bundling of data and methods that operate on that data within a single unit
Inheritance: ability of a class to inherit properties and characteristics from its parent class
Polymorphism: ability of objects to take on many forms or have multiple behaviors
Example: A car class can inherit properties from a vehicle class and have different forms like a sedan or SUV
Q234. How to tackle challenges regarding cybersecurity.
Cybersecurity challenges can be tackled through a combination of technology, training, and proactive measures.
Implementing strong encryption and firewalls to protect data
Regularly updating software and systems to patch vulnerabilities
Providing cybersecurity training to employees to prevent phishing attacks
Conducting regular security audits and penetration testing
Establishing incident response plans to quickly address breaches
Q235. What is RISK ?
Risk is the potential of gaining or losing something of value.
Risk is the uncertainty of outcome.
It involves the possibility of a negative or positive result.
Risk can be managed through strategies like risk mitigation and risk transfer.
Examples of risks include financial risk, health risk, and project risk.
Q236. Explain GST, VAT, Consolidation concept
GST and VAT are consumption taxes while consolidation concept refers to combining financial statements of multiple entities.
GST (Goods and Services Tax) is a consumption tax levied on the supply of goods and services in India.
VAT (Value Added Tax) is a consumption tax levied on the value added to goods and services at each stage of production and distribution.
Consolidation concept refers to the process of combining the financial statements of multiple entities into a single s...read more
Q237. Explain the process of kyc
KYC (Know Your Customer) is a process used by financial institutions to verify the identity of their clients.
Collecting personal information from clients
Verifying the authenticity of the information provided
Assessing the risk of illegal activities such as money laundering or fraud
Monitoring transactions for suspicious activities
Updating customer information regularly
Q238. Duplicate in the Table Union and Union ALL
Q239. How to calculate EIR for a loan taken
Effective Interest Rate (EIR) for a loan can be calculated using a formula that considers the loan amount, interest rate, and repayment schedule.
Calculate the present value of all cash flows associated with the loan, including both principal and interest payments
Determine the interest rate that equates the present value of cash flows to the loan amount
The formula for EIR calculation is complex and typically requires the use of financial calculators or software
EIR calculation ...read more
Q240. Pillars of Communication Portfolio Understanding of Change Management
Q241. What is SIEM?
SIEM stands for Security Information and Event Management. It is a software solution that helps organizations to detect and respond to security threats.
SIEM collects and analyzes security-related data from various sources such as network devices, servers, and applications.
It correlates the data to identify patterns and anomalies that may indicate a security breach.
SIEM provides real-time alerts and reports to security analysts, enabling them to take immediate action to mitiga...read more
Q242. Incorporating DQ dashboards and metrices in Collibra
Q243. What is bit coin? What is crypto currency?
Bitcoin is a digital currency that operates independently of a central bank, using cryptography to secure transactions.
Bitcoin is a decentralized digital currency, meaning it is not controlled by any government or financial institution.
Transactions are recorded on a public ledger called a blockchain, which ensures transparency and security.
Bitcoin can be used for online purchases, investment, and as a store of value.
Other cryptocurrencies, such as Ethereum and Litecoin, opera...read more
Q244. How to identify fake passports of UK
Fake UK passports can be identified by checking for security features, examining the passport's physical characteristics, and verifying the information against official databases.
Check for security features such as holograms, watermarks, and UV features.
Examine the passport's physical characteristics like the quality of printing, font consistency, and overall construction.
Verify the information on the passport against official databases like the HM Passport Office or Interpol...read more
Q245. Difference between @qualifier and @ primary in soring
The @Qualifier annotation is used to specify which bean should be autowired when multiple beans of the same type are present. The @Primary annotation is used to give higher priority to a bean when multiple beans of the same type are present.
Use @Qualifier when you have multiple beans of the same type and need to specify which one to inject.
Use @Primary to give higher priority to a bean when multiple beans of the same type are present.
Example: @Qualifier("beanName") vs @Primar...read more
Q246. What is Auditing
Auditing is the process of examining and verifying financial records to ensure accuracy and compliance with laws and regulations.
Auditing involves reviewing financial statements, records, and transactions.
The goal of auditing is to provide assurance that financial information is accurate and reliable.
Auditors may also identify areas for improvement in financial reporting and internal controls.
Examples of audits include financial statement audits, internal audits, and complian...read more
Q247. Best way to identify competitors?
Analyzing market research reports, conducting online searches, attending industry conferences.
Analyze market research reports
Conduct online searches
Attend industry conferences
Q248. 1065 details and new changes in 2024
In 2024, there will be significant details and new changes in various aspects.
Introduction of new technologies in the workplace
Changes in company policies and procedures
Updates in industry regulations and standards
Implementation of new strategies for growth and development
Q249. What is Salesforce service cloud
Salesforce Service Cloud is a customer service platform that helps businesses manage and improve customer interactions.
It allows businesses to provide personalized customer support through various channels such as phone, email, chat, and social media.
Service Cloud includes features like case management, knowledge base, and omni-channel routing to streamline customer service processes.
It integrates with other Salesforce products like Sales Cloud and Marketing Cloud to provide ...read more
Q250. What is transient and volatile keyword
transient and volatile are keywords in Java used for different purposes
transient keyword is used to indicate that a field should not be serialized when converting an object to byte stream
volatile keyword is used to indicate that a variable's value will be modified by different threads
transient keyword is used in serialization, while volatile keyword is used in multithreading
example: transient keyword - private transient int age; example: volatile keyword - private volatile bo...read more
Q251. 1- what is ACl's.
ACLs stands for Access Control Lists.
ACLs are a set of rules that define who can access a resource and what actions they can perform on it.
They are commonly used in computer systems and networks to control access to files, folders, and other resources.
ACLs can be applied to individual users, groups, or roles.
Examples of ACLs include file permissions in Unix-based systems and firewall rules in network security.
ACLs can be configured to allow or deny access based on various cri...read more
Q252. what is Enquity analysis
Equity analysis is the process of evaluating a company's financial performance and potential by examining its stock and financial statements.
It involves analyzing a company's financial statements, such as balance sheets, income statements, and cash flow statements.
It also involves examining a company's stock performance, including its price-to-earnings ratio, dividend yield, and market capitalization.
Equity analysis is used by investors to determine whether a company's stock ...read more
Q253. What is test scenario?
A test scenario is a detailed description of a specific test case or situation to be tested.
Test scenario outlines the steps to be taken, data inputs, and expected outcomes.
It helps in ensuring complete test coverage and identifying potential issues.
Example: Test scenario for login functionality - enter valid username and password, click login button, verify successful login.
Q254. What is KPMG do
KPMG is a multinational professional services network providing audit, tax, and advisory services.
KPMG is one of the Big Four accounting firms in the world.
They offer services in areas such as audit, tax, and advisory.
KPMG helps clients manage risks, improve performance, and create value.
The company operates in over 150 countries and territories.
KPMG is known for its expertise in financial services, healthcare, technology, and other industries.
Q255. journey of transaction in banking domain
The journey of a transaction in the banking domain involves multiple steps from initiation to completion.
Initiation of transaction by the customer through various channels like online banking, ATM, or in-person at a branch
Verification and authorization of the transaction by the bank's systems and security measures
Processing of the transaction by the bank, which may involve transferring funds between accounts or to external parties
Confirmation of the transaction to the custome...read more
Q256. Projects completed in past company
I have completed various projects in my past company, ranging from data analysis to predictive modeling.
Developed predictive models to forecast sales trends
Conducted data analysis to identify key insights for business strategy
Implemented data visualization tools to communicate findings to stakeholders
Q257. How would you audit Trade receivables
Trade receivables are audited by verifying the existence, valuation, and rights of the receivables.
Verify the existence of trade receivables by confirming with customers through direct communication or third-party confirmations.
Assess the valuation of trade receivables by reviewing the aging schedule and assessing the likelihood of collection.
Examine the rights associated with trade receivables by reviewing contracts, invoices, and other relevant documentation.
Perform analyti...read more
Q258. What is kyc why it is required?
KYC stands for Know Your Customer. It is required to verify the identity of customers to prevent fraud, money laundering, and terrorist financing.
KYC is a process used by financial institutions to verify the identity of their customers.
It involves collecting personal information such as name, address, date of birth, and government-issued identification.
KYC helps prevent fraud, money laundering, and terrorist financing by ensuring that customers are who they claim to be.
Failur...read more
Q259. How to you handle conflict
I handle conflict by actively listening, seeking to understand the other person's perspective, and finding a mutually beneficial solution.
I remain calm and composed during the conflict
I actively listen to the other person's perspective
I seek to understand their concerns and needs
I communicate my own perspective and needs clearly
I work towards finding a mutually beneficial solution
I am open to compromise and finding common ground
I follow up to ensure the solution is working fo...read more
Q260. What do you mean by transfer pricing
Transfer pricing refers to the setting of prices for goods and services sold between related entities within a multinational company.
Transfer pricing is used to determine the value of transactions between different parts of a company, often located in different countries.
It is important for tax purposes to ensure that these transactions are conducted at arm's length, meaning they are priced as if the entities were unrelated.
Transfer pricing can impact the allocation of profit...read more
Q261. WHERE DO WE USE CONDITIONAL FORMATIING
Conditional formatting is used in spreadsheets and databases to highlight data based on specified conditions.
In Excel, conditional formatting can be used to highlight cells that meet certain criteria, such as values above or below a certain threshold.
In databases, conditional formatting can be used to visually distinguish data that meets specific conditions, such as overdue tasks or high-priority items.
Conditional formatting can help users quickly identify important informati...read more
Q262. what is primary key
Primary key is a unique identifier for each record in a database table.
Primary key ensures each record in a table is unique
It can be a single column or a combination of columns
Primary key values cannot be null
Q263. What do you know about money laundering?
Money laundering is the illegal process of making large amounts of money generated by a criminal activity, such as drug trafficking or terrorist funding, appear to have come from a legitimate source.
Money laundering involves disguising the origins of illegally obtained money.
It typically involves a series of transactions to make the money appear legitimate.
Money laundering can involve complex financial transactions and multiple parties.
Examples of money laundering include str...read more
Q264. A/B deployment, how it is done?
A/B deployment is a method of releasing new features to a subset of users before rolling it out to the entire user base.
Divide users into two groups - A and B
Release new feature to group A while group B continues to use the old version
Monitor performance and gather feedback from group A
If successful, release feature to group B. If not, make necessary adjustments before full rollout
Examples: Facebook testing new layout with a small group of users before rolling it out to every...read more
Q265. what are the different types of opnion?
Different types of opinions in accounting
Unqualified opinion - financial statements are fairly presented
Qualified opinion - financial statements are fairly presented except for a specific issue
Adverse opinion - financial statements are not fairly presented
Disclaimer of opinion - auditor is unable to express an opinion due to lack of information or other limitations
Opinion on internal controls - auditor's assessment of the effectiveness of a company's internal controls
Q266. Type of work done for FS particularly in ESG
In FS, work done for ESG involves advising financial institutions on integrating environmental, social, and governance factors into their investment decisions.
Advising on ESG integration strategies
Conducting ESG risk assessments
Developing sustainable investment products
Assisting with ESG reporting and disclosure
Engaging with stakeholders on ESG issues
Q267. What do you understand by BPMN
BPMN stands for Business Process Model and Notation. It is a graphical representation of business processes.
BPMN is used to create visual models of business processes
It is a standardized notation that allows for easy communication between stakeholders
BPMN diagrams consist of various shapes and symbols that represent different elements of a process
Examples of BPMN symbols include events, activities, gateways, and flows
BPMN can be used to model both simple and complex processes
Q268. working capital cost of capital
Working capital cost of capital is the cost of financing a company's short-term assets and liabilities.
Working capital cost of capital is the cost of financing a company's current assets and liabilities
It is the cost of funds used to finance the day-to-day operations of a business
It includes the cost of short-term debt, accounts payable, and inventory financing
The cost of working capital is important to consider when evaluating a company's overall cost of capital
Q269. process of carbon credit
Carbon credits are a way to reduce greenhouse gas emissions by allowing companies to buy credits for their emissions and invest in projects that reduce emissions.
Carbon credits are a market-based mechanism to incentivize companies to reduce their greenhouse gas emissions.
Companies can buy carbon credits to offset their own emissions by investing in projects that reduce emissions, such as renewable energy or reforestation.
The process involves measuring, reporting, and verifyin...read more
Q270. Explain interactive report and module pool report
An interactive report is a type of report in SAP ABAP that allows users to interact with the data displayed, while a module pool report is a collection of screens and flow logic used for creating interactive applications.
Interactive report: Allows users to interact with the data displayed
Module pool report: Collection of screens and flow logic for creating interactive applications
Interactive report can have user input fields, drill-down functionality, and sorting options
Modul...read more
Q271. Palindrome with react js to show on UI
Create a palindrome checker using React JS to display on the UI
Create a input field for user to enter a string
Use state to store the input string
Create a function to check if the input string is a palindrome
Display the result on the UI
Q272. What do you mean by SaaS?
SaaS stands for Software as a Service, a cloud-based software delivery model where applications are hosted by a third-party provider and accessed over the internet.
SaaS allows users to access software applications via the internet without the need for installation or maintenance.
Users typically pay a subscription fee to use SaaS applications, which are centrally hosted and managed by the provider.
Examples of SaaS include Salesforce, Microsoft Office 365, and Google Workspace.
Q273. relation of financial system
The financial system refers to the network of institutions, markets, and regulations that facilitate the flow of funds between savers and borrowers.
The financial system includes banks, stock exchanges, insurance companies, and regulatory bodies.
It plays a crucial role in allocating resources efficiently in an economy.
Financial systems vary across countries based on their level of development and regulatory framework.
Examples of financial systems include the US financial syste...read more
Q274. Explain about CIA triad.
CIA triad is a model designed to guide policies for information security within an organization.
CIA stands for Confidentiality, Integrity, and Availability
Confidentiality ensures that information is only accessible to those who are authorized to view it
Integrity ensures that information is accurate and trustworthy
Availability ensures that information is accessible when needed
Example: Encrypting sensitive data to maintain confidentiality
Q275. Optimisation techniques used
Optimisation techniques used in data engineering
Partitioning data to improve query performance
Using indexing to speed up data retrieval
Implementing caching mechanisms to reduce data access time
Optimizing data storage formats for efficient storage and processing
Parallel processing and distributed computing for faster data processing
Using compression techniques to reduce storage space and improve data transfer
Applying query optimization techniques like query rewriting and query...read more
Q276. What is depreciation?
Depreciation is the allocation of the cost of a tangible asset over its useful life.
Depreciation is a non-cash expense that reduces the value of an asset over time.
It reflects the wear and tear, aging, or obsolescence of an asset.
Common methods of calculating depreciation include straight-line, double declining balance, and units of production.
Examples of depreciable assets include buildings, vehicles, machinery, and equipment.
Q277. Do you read newspapers?
Yes, I read newspapers regularly to stay updated on current events and developments.
I read newspapers to stay informed about current events and developments in the tax field.
Reading newspapers helps me stay up-to-date on changes in tax laws and regulations.
I also read newspapers to understand the impact of current events on the economy and tax policies.
Q278. How do you perform Partitioning
Partitioning in Azure Data Engineer involves dividing data into smaller chunks for better performance and manageability.
Partitioning can be done based on a specific column or key in the dataset
It helps in distributing data across multiple nodes for parallel processing
Partitioning can improve query performance by reducing the amount of data that needs to be scanned
In Azure Synapse Analytics, you can use ROUND_ROBIN or HASH distribution for partitioning
Q279. 1. How will you audit PPE
PPE audit involves verifying existence, valuation, and depreciation of assets.
Verify existence of PPE through physical inspection and documentation
Verify valuation of PPE through comparison with market prices and depreciation schedules
Verify depreciation of PPE through review of accounting records and calculations
Consider impairment testing for PPE that may have suffered a decline in value
Ensure compliance with relevant accounting standards and regulations
Document findings an...read more
Q280. Golden rules of accounting
Golden rules of accounting are basic principles that guide the process of recording financial transactions.
The three golden rules of accounting are: Debit what comes in, Credit what goes out; Debit the receiver, Credit the giver; Debit expenses and losses, Credit income and gains.
These rules help ensure accurate recording of financial transactions and maintain the balance in the accounting equation.
For example, when a company receives cash from a customer, it would debit the ...read more
Q281. Optimising technique that you have used
I have used partitioning and indexing to optimize query performance.
Implemented partitioning on large tables to improve query performance by limiting the data scanned
Created indexes on frequently queried columns to speed up data retrieval
Utilized clustering keys to physically organize data on disk for faster access
Q282. 3 tier application on AWS
A 3 tier application on AWS involves separating the presentation, application, and data layers for scalability and flexibility.
Presentation tier: User interface, handles user interaction (e.g. web server)
Application tier: Business logic, processes requests (e.g. application server)
Data tier: Database, stores and retrieves data (e.g. RDS)
Use AWS services like EC2, Elastic Beanstalk, RDS, and S3 for each tier
Implement load balancing and auto-scaling for high availability and pe...read more
Q283. What is the LWD
LWD stands for Logging While Drilling.
LWD is a technique used in the oil and gas industry to collect data while drilling a well.
It involves the use of specialized tools and sensors to measure various parameters such as formation properties, drilling parameters, and wellbore conditions.
The collected data is transmitted to the surface in real-time, allowing for immediate analysis and decision-making.
LWD helps in optimizing drilling operations, evaluating reservoir characteristi...read more
Q284. Whether you have listed client audits
Yes, I have experience with client audits at previous positions.
I have conducted client audits at previous positions
I am familiar with the process of client audits
I have experience working with clients to ensure compliance and accuracy in financial reporting
Q285. Write trigger on parent child scenario
Writing trigger on parent child scenario in Salesforce
Create trigger on parent object
Use trigger context variables to access child records
Perform necessary operations on child records based on parent record changes
Q286. what are the CARO requirements?
CARO requirements refer to the Companies (Auditor's Report) Order, which outlines the audit requirements for companies in India.
CARO requirements were introduced in 2015 and have been updated periodically since then.
The requirements cover areas such as financial statements, internal controls, and compliance with laws and regulations.
Auditors must provide a report on whether the company has complied with the CARO requirements.
CARO requirements apply to all companies in India, ...read more
Q287. canyou manage multiple engagements?
Yes, I have experience managing multiple engagements simultaneously.
I have successfully managed multiple sales projects at the same time in my previous roles.
I am skilled at prioritizing tasks and delegating responsibilities to ensure all engagements are handled efficiently.
I have strong organizational skills that allow me to juggle multiple tasks without compromising on quality.
I am adept at communication and coordination to keep all stakeholders informed and on track.
For ex...read more
Q288. where is your prefeered location?
I am open to relocating for the right opportunity, but my preferred location is in a major city with a strong business presence.
Open to relocating for the right opportunity
Preferred location in a major city
Strong business presence is a priority
Q289. what is finance analysis
Finance analysis is the process of evaluating financial data to make informed business decisions.
It involves analyzing financial statements, market trends, and economic indicators.
It helps in identifying financial risks and opportunities.
It is used to make investment decisions, assess company performance, and develop financial strategies.
Examples include ratio analysis, trend analysis, and cash flow analysis.
Q290. Data governance functional areas and pillars.
Q291. Detailed description on GRC
GRC stands for Governance, Risk, and Compliance. It is a framework that helps organizations manage their operations and ensure compliance with regulations.
Governance refers to the processes and policies that guide an organization's decision-making and management.
Risk management involves identifying and assessing potential risks to the organization and implementing strategies to mitigate them.
Compliance refers to adhering to laws, regulations, and industry standards that apply...read more
Q292. What are the components of RFP
RFP components include project overview, requirements, evaluation criteria, timeline, and budget.
Project overview: description of the project and its goals
Requirements: detailed specifications of what is expected from the vendor
Evaluation criteria: how the proposals will be evaluated and scored
Timeline: deadlines for proposal submission and project completion
Budget: financial constraints and expectations
Q293. Experience in the transaction domain
I have 5 years of experience in the transaction domain, including M&A deals and financial transactions.
Managed due diligence process for multiple M&A transactions
Negotiated terms and conditions for financial transactions
Analyzed financial statements and prepared valuation models
Collaborated with legal and finance teams to ensure smooth transactions
Q294. Mitigation steps for issues found in source code
Mitigation steps for issues found in source code involve identifying vulnerabilities, prioritizing fixes, implementing secure coding practices, and conducting regular code reviews.
Identify vulnerabilities through code analysis tools like static code analyzers or manual code reviews
Prioritize fixes based on severity and impact on the system
Implement secure coding practices such as input validation, output encoding, and proper error handling
Conduct regular code reviews to catch...read more
Q295. What do you understand by Audit
Audit is a systematic examination of financial records, documents, transactions, and processes to ensure accuracy and compliance.
Audit involves reviewing and evaluating financial statements and records
It ensures compliance with laws, regulations, and company policies
Auditors provide an independent and objective assessment of an organization's financial health
Types of audits include internal, external, financial, operational, and compliance audits
Audits help identify risks, er...read more
Q296. ISO standards and implementation
ISO standards are internationally recognized guidelines for quality management systems. Implementation involves establishing processes and procedures to meet these standards.
ISO standards help organizations ensure quality, efficiency, and consistency in their products or services.
Implementation involves conducting a gap analysis to identify areas where current processes do not meet ISO requirements.
Developing a plan to address the gaps, training employees on new processes, an...read more
Q297. Have you worked on flows
Yes, I have worked on flows in Salesforce.
I have experience creating flows to automate business processes in Salesforce.
I have used flows to streamline data entry and update records efficiently.
I have integrated flows with other Salesforce features like Process Builder and Apex triggers.
Q298. Explain About finance
Finance is the management of money and investments, including budgeting, saving, borrowing, lending, and investing.
Finance involves managing money and investments.
It includes activities like budgeting, saving, borrowing, lending, and investing.
Finance helps individuals and organizations make informed financial decisions.
Financial markets play a key role in finance, facilitating the buying and selling of assets like stocks and bonds.
Q299. What are audit assertions
Audit assertions are the claims made by management regarding the accuracy and completeness of financial statements.
Audit assertions are used by auditors to assess the risk of material misstatement in financial statements.
There are six types of audit assertions: existence, completeness, accuracy, cutoff, classification, and presentation.
For example, existence assertion means that the assets and liabilities exist at a given date, while completeness assertion means that all tran...read more
Q300. End to End development process
End to end development process involves planning, designing, implementing, testing, and deploying a solution.
Planning: Define project scope, objectives, and requirements.
Designing: Create a detailed design based on the requirements.
Implementing: Develop the solution using appropriate technologies.
Testing: Conduct thorough testing to ensure the solution meets requirements.
Deploying: Roll out the solution to users and provide support as needed.
Top HR Questions asked in Bharat Ratna Indira Gandhi College Engineering
Interview Process at Bharat Ratna Indira Gandhi College Engineering
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month