Add office photos
Employer?
Claim Account for FREE

KPMG India

3.5
based on 5.5k Reviews
Filter interviews by

400+ Bhuvaneshwari Enterprise Interview Questions and Answers

Updated 1 Mar 2025
Popular Designations

Q301. OOPs concepts and examples

Ans.

OOPs concepts refer to Object-Oriented Programming principles like inheritance, encapsulation, polymorphism, and abstraction.

  • Inheritance: Allows a class to inherit properties and behavior from another class.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit.

  • Polymorphism: Ability to present the same interface for different data types.

  • Abstraction: Hiding the complex implementation details and showing only the necessary features.

Add your answer

Q302. what is Cooperative bank?

Ans.

Cooperative bank is a financial institution owned and operated by its members to provide banking services.

  • Owned and operated by its members

  • Provides banking services

  • Focuses on serving the needs of its members and community

Add your answer

Q303. What is aml and types of aml?

Ans.

AML stands for Anti-Money Laundering. It is a set of regulations and procedures designed to prevent the illegal generation of income.

  • AML involves monitoring financial transactions to detect and prevent money laundering activities.

  • Types of AML include customer due diligence, transaction monitoring, and suspicious activity reporting.

  • Examples of AML regulations include the USA PATRIOT Act and the Financial Action Task Force (FATF) recommendations.

Add your answer

Q304. Operational improvements in mining operations

Ans.

Implementing operational improvements in mining operations to increase efficiency and productivity.

  • Implementing advanced technology for automation and remote monitoring

  • Optimizing production processes to reduce downtime and increase output

  • Improving safety measures to protect workers and equipment

  • Implementing predictive maintenance strategies to prevent equipment failures

  • Investing in training and development programs for employees to enhance skills and knowledge

Add your answer
Discover Bhuvaneshwari Enterprise interview dos and don'ts from real experiences

Q305. Hypotheses on a situation

Ans.

Hypotheses on a situation

  • Identify the situation and gather relevant information

  • Formulate multiple hypotheses based on the available data

  • Consider different perspectives and potential outcomes

  • Test the hypotheses through experimentation or analysis

  • Evaluate the results and refine the hypotheses if necessary

Add your answer

Q306. Recommended reconciliation process

Ans.

The recommended reconciliation process involves comparing financial records to ensure accuracy and consistency.

  • Ensure all transactions are recorded accurately

  • Compare financial records with bank statements

  • Investigate and resolve any discrepancies

  • Document the reconciliation process for audit purposes

Add your answer
Are these interview questions helpful?

Q307. Two value adding points you recommended

Ans.

Two value adding points recommended

  • Implementing a customer loyalty program to increase customer retention

  • Introducing a new product line to expand the customer base

  • Offering personalized services to enhance customer experience

Add your answer

Q308. Difference between UBO, BO and IBO

Ans.

UBO stands for Ultimate Beneficial Owner, BO stands for Beneficial Owner, and IBO stands for Immediate Beneficial Owner.

  • UBO is the individual who ultimately owns or controls a legal entity or arrangement.

  • BO is any individual who ultimately owns or controls a legal entity or arrangement, or on whose behalf a transaction is being conducted.

  • IBO is the individual who owns or controls a legal entity or arrangement and whose identity needs to be verified immediately.

  • Example: If a c...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q309. Explain the process of network VAPT?

Ans.

Network VAPT is the process of assessing the security of a network by identifying vulnerabilities and testing for potential exploits.

  • 1. Conducting a thorough assessment of the network infrastructure to identify potential vulnerabilities.

  • 2. Performing various types of penetration testing to simulate real-world attacks and test the effectiveness of security measures.

  • 3. Analyzing the results of the tests to prioritize and address critical vulnerabilities.

  • 4. Providing recommendat...read more

Add your answer

Q310. How to audit cost of sales

Ans.

Auditing cost of sales involves verifying the accuracy and completeness of expenses related to producing and selling goods or services.

  • Reviewing invoices and receipts for direct materials, labor, and overhead costs

  • Comparing actual costs to budgeted or standard costs

  • Testing the accuracy of inventory valuation and cost of goods sold calculations

  • Evaluating the effectiveness of internal controls over cost of sales

  • Analyzing trends and fluctuations in cost of sales over time

Add your answer

Q311. Is Land ever depreciated?

Ans.

No, land is not depreciated as it is considered to have an indefinite useful life.

  • Land is not subject to depreciation because it is considered to have an indefinite useful life.

  • Depreciation is only applicable to assets that have a limited useful life, such as buildings or machinery.

  • The cost of land is typically not allocated over time like other assets, but rather recorded at its original cost on the balance sheet.

  • Land may appreciate in value over time, rather than depreciate...read more

Add your answer

Q312. What is Medallion Architecture

Ans.

Medallion Architecture is a data processing architecture that involves breaking down data into smaller pieces for easier processing.

  • Medallion Architecture involves breaking down data into smaller pieces for easier processing

  • It allows for parallel processing of data to improve performance

  • Commonly used in big data processing systems like Hadoop and Spark

Add your answer

Q313. What is Spark Architecture

Ans.

Spark Architecture is a distributed computing framework that provides an efficient way to process large datasets.

  • Spark Architecture consists of a driver program, cluster manager, and worker nodes.

  • It uses Resilient Distributed Datasets (RDDs) for fault-tolerant distributed data processing.

  • Spark supports various programming languages like Scala, Java, Python, and SQL.

  • It includes components like Spark Core, Spark SQL, Spark Streaming, and MLlib for different data processing task...read more

Add your answer

Q314. Explain SQL joins

Ans.

SQL joins are used to combine rows from two or more tables based on a related column between them.

  • Types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN

  • INNER JOIN returns rows when there is at least one match in both tables

  • LEFT JOIN returns all rows from the left table and the matched rows from the right table

  • RIGHT JOIN returns all rows from the right table and the matched rows from the left table

  • FULL JOIN returns rows when there is a match in one of the tabl...read more

Add your answer

Q315. Caro 2020 reporting for 21-22

Ans.

Caro 2020 reporting for 21-22 is a set of guidelines for auditors to follow while conducting audits.

  • Caro 2020 reporting is a set of guidelines issued by the Institute of Chartered Accountants of India (ICAI) for auditors to follow while conducting audits.

  • These guidelines are applicable for audits conducted for the financial year 2021-22.

  • The guidelines cover various aspects of auditing such as risk assessment, internal control evaluation, and reporting.

  • Auditors are required to...read more

Add your answer

Q316. explain Sanctions? example countries

Ans.

Sanctions are penalties imposed by one country on another for various reasons, such as human rights violations or nuclear proliferation.

  • Sanctions can include trade restrictions, financial penalties, travel bans, and arms embargoes.

  • Examples of countries facing sanctions include North Korea, Iran, Russia, and Venezuela.

  • Sanctions are often used as a diplomatic tool to pressure countries into changing their behavior.

Add your answer

Q317. To find the join result of two tables

Ans.

To find the join result of two tables, you can use SQL JOIN statement.

  • Use SQL JOIN statement to combine rows from two or more tables based on a related column between them.

  • Types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN.

  • Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column;

Add your answer

Q318. What is Withholding tax?

Ans.

Withholding tax is a tax deducted at source by the payer of income, typically on interest, dividends, or wages.

  • Withholding tax is deducted by the payer of income before it is paid to the recipient.

  • It is commonly applied to interest, dividends, royalties, and wages.

  • The withheld tax is then paid directly to the government on behalf of the recipient.

  • The recipient may still need to report the income and withholding tax on their tax return.

  • Withholding tax rates vary depending on t...read more

Add your answer

Q319. what is opation

Ans.

An option is a contract that gives the buyer the right, but not the obligation, to buy or sell an underlying asset at a specific price on or before a certain date.

  • Options are commonly used in the stock market as a form of derivative trading.

  • There are two types of options: call options and put options.

  • Call options give the buyer the right to buy the underlying asset at a specific price, while put options give the buyer the right to sell the underlying asset at a specific price...read more

Add your answer

Q320. What is preference shares

Ans.

Preference shares are a type of stock that gives shareholders priority over common shareholders in terms of dividends and assets in the event of liquidation.

  • Preference shares typically pay fixed dividends, while common shares do not have a guaranteed dividend.

  • Preference shareholders have a higher claim on assets and earnings than common shareholders.

  • Preference shares may have features such as cumulative dividends, convertible to common shares, or callable by the issuer.

  • Exampl...read more

Add your answer

Q321. Difference Between before and after trigger

Add your answer

Q322. Elaborate about case study

Ans.

A case study is a research method used to analyze a particular situation or problem.

  • It involves collecting and analyzing data from various sources

  • It is often used in business, healthcare, and education

  • It can be qualitative or quantitative in nature

  • It helps in understanding complex issues and developing solutions

  • Example: A case study on how a company increased its sales by implementing a new marketing strategy

Add your answer

Q323. How NodeJs handles concurrency

Ans.

NodeJs handles concurrency using event-driven, non-blocking I/O model.

  • NodeJs uses event loop to handle multiple requests concurrently.

  • It utilizes asynchronous functions to avoid blocking the main thread.

  • NodeJs supports callbacks, promises, and async/await for managing asynchronous operations.

Add your answer

Q324. Mention life cycle hooks of angular

Ans.

Angular lifecycle hooks are methods that allow you to tap into the lifecycle of a component or directive.

  • ngOnChanges: Called when an input property changes

  • ngOnInit: Called once the component is initialized

  • ngDoCheck: Called during every change detection run

  • ngAfterContentInit: Called after content (ng-content) has been projected into the component

  • ngAfterContentChecked: Called after every check of the projected content

  • ngAfterViewInit: Called after the component's view has been i...read more

Add your answer

Q325. what is materiality and PM?

Ans.

Materiality and PM refer to the concept of significance in auditing, with materiality being the threshold for financial information to be considered important and PM being the performance materiality set below materiality.

  • Materiality is the threshold at which financial information becomes significant enough to influence the decisions of users of the financial statements.

  • Performance materiality (PM) is set below materiality and is used to determine the extent of misstatements ...read more

Add your answer

Q326. Top and Bottom in one sheet

Ans.

Use LOD calculations to display top and bottom values in one sheet in Tableau.

  • Use Level of Detail (LOD) calculations to create separate calculated fields for top and bottom values.

  • Use these calculated fields in the same sheet to display both top and bottom values.

  • For example, create a calculated field for top values using {FIXED [Dimension]: MAX([Measure])} and another for bottom values using {FIXED [Dimension]: MIN([Measure])}.

Add your answer

Q327. Types of LOD and its use case

Ans.

Types of LOD include Fixed, Include, and Exclude LOD calculations for different use cases.

  • Fixed LOD: Used to ignore the level of detail in the view and compute an aggregate value.

  • Include LOD: Used to compute an aggregate value at a higher level of detail than the view.

  • Exclude LOD: Used to compute an aggregate value at a lower level of detail than the view.

Add your answer

Q328. Experience in devops tools

Ans.

I have experience with various devops tools such as Jenkins, Docker, and Ansible.

  • Proficient in setting up and configuring Jenkins for continuous integration and deployment

  • Familiar with Docker for containerization of applications

  • Experience in using Ansible for automation of infrastructure management tasks

Add your answer

Q329. Types of triggers in azure data factory

Ans.

Types of triggers in Azure Data Factory include schedule, tumbling window, event, and manual triggers.

  • Schedule trigger: Runs pipelines on a specified schedule.

  • Tumbling window trigger: Runs pipelines at regular intervals based on a time window.

  • Event trigger: Triggers pipelines based on events like file arrival or HTTP request.

  • Manual trigger: Allows manual execution of pipelines.

Add your answer

Q330. What is Apex

Ans.

Apex is a programming language used to develop customizations for Salesforce applications.

  • Apex is similar to Java and C#.

  • It is used to write business logic and perform database operations.

  • It can be used to create triggers, classes, and controllers.

  • Apex code runs on the Salesforce platform.

  • Example: Apex can be used to create a custom button that updates a record when clicked.

Add your answer

Q331. what is transfer pricing

Ans.

Transfer pricing is the setting of prices for goods and services sold between related entities within a company.

  • Transfer pricing ensures that transactions between related entities are conducted at arm's length to prevent tax evasion.

  • It involves determining the appropriate price for goods or services transferred between different parts of a multinational company.

  • Transfer pricing can impact a company's tax liabilities and financial statements.

  • Examples include setting prices for...read more

Add your answer

Q332. what is cost plus method

Ans.

Cost plus method is a transfer pricing technique where a markup is added to the cost of production to determine the transfer price.

  • Involves adding a markup to the cost of production

  • Commonly used when the controlled transaction involves tangible goods

  • Ensures that the selling entity earns a profit margin on top of the production cost

  • Can be calculated based on comparable transactions in the market

Add your answer

Q333. EBITDA improvement in mining projects

Ans.

Improving EBITDA in mining projects involves optimizing operational efficiency and cost management.

  • Implementing cost-saving measures such as reducing energy consumption and optimizing equipment maintenance

  • Increasing production output through improved mining techniques and technology

  • Negotiating favorable contracts with suppliers to lower input costs

  • Diversifying revenue streams by exploring new markets or commodities

  • Regularly reviewing financial performance and identifying area...read more

Add your answer

Q334. journey table of a marketplace

Ans.

The journey table of a marketplace tracks the steps customers take from browsing to purchasing.

  • Tracks customer interactions from browsing to purchasing

  • Includes timestamps for each step

  • Can help identify areas for improvement in the customer journey

Add your answer

Q335. What is Ltcg and Stcg

Ans.

LTCG stands for Long Term Capital Gains and STCG stands for Short Term Capital Gains.

  • LTCG is the profit earned from the sale of an asset held for more than a year.

  • STCG is the profit earned from the sale of an asset held for less than a year.

  • LTCG is taxed at a lower rate than STCG.

  • Example: Selling a stock after holding it for 2 years would result in LTCG, while selling it after 6 months would result in STCG.

Add your answer

Q336. What is ebita and brs

Ans.

EBITA stands for Earnings Before Interest, Taxes, Depreciation, and Amortization. BRS stands for Bank Reconciliation Statement.

  • EBITA is a measure of a company's operating performance without factoring in interest, taxes, depreciation, and amortization.

  • BRS is a statement that reconciles the balance in a company's bank account with the balance shown in its accounting records.

  • EBITA helps in evaluating a company's profitability from core operations, while BRS ensures accuracy in ...read more

Add your answer

Q337. what is a balance sheet

Ans.

A balance sheet is a financial statement that provides a snapshot of a company's financial position at a specific point in time.

  • It shows the company's assets, liabilities, and shareholders' equity

  • Assets are what the company owns, liabilities are what it owes, and shareholders' equity is the difference between the two

  • The balance sheet follows the accounting equation: Assets = Liabilities + Shareholders' Equity

  • It helps investors and analysts assess the financial health and stab...read more

Add your answer

Q338. Find the duplicates using hashmap

Ans.

Use hashmap to find duplicates in an array of strings

  • Create a hashmap to store each string as key and count as value

  • Iterate through the array and check if the string already exists in the hashmap

  • If it does, increment the count, else add it to the hashmap

  • Return the strings with count greater than 1 as duplicates

Add your answer

Q339. Explain comparator and comparable

Ans.

Comparator and Comparable are interfaces in Java used for sorting objects.

  • Comparator interface is used to define custom sorting logic for objects.

  • Comparable interface is used to define natural ordering of objects.

  • Comparator is used when you want to sort objects based on multiple attributes.

  • Comparable is used when you want to sort objects based on a single attribute.

  • Example: Sorting a list of Person objects based on their age using Comparator.

  • Example: Sorting a list of String ...read more

Add your answer

Q340. What is Linear regression

Ans.

Linear regression is a statistical method used to model the relationship between a dependent variable and one or more independent variables.

  • Linear regression is used to predict the value of a dependent variable based on the value of one or more independent variables.

  • It assumes a linear relationship between the independent and dependent variables.

  • The goal of linear regression is to find the best-fitting line that minimizes the sum of squared differences between the observed va...read more

Add your answer

Q341. What li list and tuple

Ans.

List and tuple are both data structures in Python, but list is mutable while tuple is immutable.

  • List is denoted by square brackets [] while tuple is denoted by parentheses ().

  • Elements in a list can be changed, added, or removed, while elements in a tuple cannot be changed once defined.

  • Lists are used when you need a collection of items that may change, while tuples are used for fixed collections of items.

  • Example: list = [1, 2, 3] and tuple = (4, 5, 6)

Add your answer

Q342. Implement Singleton design pattern

Ans.

Singleton design pattern ensures a class has only one instance and provides a global point of access to it.

  • Create a private static instance variable in the class.

  • Provide a public static method to access the instance.

  • Ensure the constructor is private to prevent instantiation from outside the class.

Add your answer

Q343. What is cybersecurity

Ans.

Cybersecurity is the practice of protecting systems, networks, and data from digital attacks.

  • Cybersecurity involves implementing measures to prevent unauthorized access to information.

  • It includes technologies, processes, and practices designed to protect networks, devices, and data from attack, damage, or unauthorized access.

  • Examples of cybersecurity measures include firewalls, antivirus software, encryption, and multi-factor authentication.

Add your answer

Q344. How will you generate business

Ans.

I will generate business by implementing targeted marketing strategies and building strong relationships with potential clients.

  • Identify target market and tailor marketing strategies accordingly

  • Utilize social media and digital marketing to reach a wider audience

  • Attend networking events and conferences to connect with potential clients

  • Offer promotions or discounts to attract new customers

  • Provide excellent customer service to retain existing clients

Add your answer

Q345. What's your POV on Layering

Ans.

Layering is a form of financial fraud where multiple transactions are made to create confusion and hide the original source of funds.

  • Layering involves multiple transactions to obscure the origin of funds.

  • It is a common technique used in money laundering to make it difficult to trace the illegal source of funds.

  • Examples of layering include transferring funds between multiple accounts in different countries or making numerous small transactions to avoid detection.

Add your answer

Q346. What is audit trail.

Ans.

An audit trail is a chronological record of all activities related to a specific operation or event.

  • It provides a detailed history of changes made to data, including who made the changes and when.

  • Audit trails are commonly used in financial audits to track transactions and ensure accuracy.

  • They help in detecting errors, fraud, or unauthorized activities by providing a trail of evidence.

  • Audit trails are essential for maintaining data integrity and accountability.

  • Examples include...read more

Add your answer

Q347. SWOT analysis of yourself

Ans.

I am a detail-oriented and adaptable individual with strong analytical skills.

  • Strengths: Strong analytical skills, detail-oriented, adaptable

  • Weaknesses: Can be overly critical of myself, tendency to overthink

  • Opportunities: Continuously learning and improving skills, networking with professionals in the field

  • Threats: Rapidly changing technology and regulations, potential for burnout in a high-pressure work environment

Add your answer

Q348. What are sanctions

Ans.

Sanctions are penalties or restrictions imposed on individuals, entities, or countries to enforce international laws or policies.

  • Sanctions can include financial restrictions, trade embargoes, travel bans, and asset freezes.

  • They are often used to deter illegal activities, promote human rights, or maintain international peace and security.

  • Examples of sanctions include the United Nations sanctions on North Korea, the US sanctions on Iran, and the EU sanctions on Russia.

Add your answer

Q349. Explain the Ebitda free cash flow

Add your answer

Q350. Merge sort time complexity less

Ans.

Merge sort has a time complexity of O(n log n) in the worst case scenario.

  • Merge sort divides the array into two halves, sorts them recursively, and then merges them back together.

  • The time complexity of merge sort is O(n log n) in the worst case scenario.

  • For example, sorting an array of 8 elements would take 3 recursive calls to merge sort.

Add your answer

Q351. Spark optimization techniques

Ans.

Spark optimization techniques involve partitioning, caching, and tuning resources for efficient data processing.

  • Partitioning data to distribute workload evenly

  • Caching frequently accessed data to avoid recomputation

  • Tuning resources like memory allocation and parallelism

  • Using broadcast variables for small lookup tables

Add your answer

Q352. What is KYC and AML?

Ans.

KYC stands for Know Your Customer and AML stands for Anti-Money Laundering. They are regulatory processes to verify the identity of clients and prevent illegal financial activities.

  • KYC is the process of verifying the identity of customers to ensure they are who they claim to be.

  • AML is the set of procedures, laws, and regulations designed to prevent money laundering by criminals.

  • KYC helps financial institutions assess the risk of illegal intentions of customers.

  • AML involves mo...read more

Add your answer

Q353. What is kyc ?

Ans.

KYC stands for Know Your Customer. It is a process used by financial institutions to verify the identity of their clients.

  • KYC is a regulatory requirement to prevent money laundering and fraud

  • It involves collecting personal information and verifying it through documents

  • Examples of KYC documents include passport, driver's license, and utility bills

Add your answer

Q354. What is AML ?

Ans.

AML stands for Anti-Money Laundering. It is a set of laws, regulations, and procedures designed to prevent criminals from disguising illegally obtained funds as legitimate income.

  • AML is a regulatory framework that aims to detect and prevent money laundering activities.

  • Financial institutions are required to have AML programs in place to monitor and report suspicious activities.

  • Examples of AML measures include customer due diligence, transaction monitoring, and reporting of sus...read more

Add your answer

Q355. What is ML ?

Ans.

ML stands for Machine Learning, a subset of artificial intelligence that focuses on the development of algorithms and models that allow computers to learn from and make predictions or decisions based on data.

  • ML involves training algorithms to learn patterns and make predictions or decisions without being explicitly programmed.

  • Common techniques in ML include supervised learning, unsupervised learning, and reinforcement learning.

  • Examples of ML applications include recommendatio...read more

Add your answer

Q356. Differnce between ltcg and STCG

Ans.

LTCG is tax on profits from assets held for over a year, while STCG is tax on profits from assets held for less than a year.

  • LTCG is taxed at a lower rate than STCG.

  • LTCG is applicable on assets held for more than a year, while STCG is applicable on assets held for less than a year.

  • LTCG is calculated by subtracting the purchase price from the selling price, while STCG is calculated by subtracting the purchase price from the selling price and adding any applicable fees or commis...read more

Add your answer

Q357. Usage of parameter and filters

Ans.

Parameters and filters are key features in Tableau for dynamic data analysis and visualization.

  • Parameters allow users to input values that can be used in calculations, filters, and reference lines.

  • Filters are used to limit the data displayed in a visualization based on specified criteria.

  • Parameters can be used to create dynamic filters that allow users to interact with the data in real-time.

  • Combining parameters and filters can provide users with more control over the data the...read more

Add your answer

Q358. Tableau Prep and its usage

Ans.

Tableau Prep is a data preparation tool that allows users to clean, combine, and shape data for analysis in Tableau.

  • Tableau Prep helps in cleaning and transforming data before visualizing it in Tableau Desktop.

  • It allows users to easily combine multiple data sources and perform data cleaning tasks like removing duplicates, splitting columns, and aggregating data.

  • Tableau Prep also provides a visual interface for creating data flows, making it easier for users to understand and ...read more

Add your answer
Ans.

Snowflake schema is a normalized form of Star schema with multiple levels of dimension tables.

  • Snowflake schema has normalized dimension tables, while Star schema has denormalized dimension tables.

  • Snowflake schema is more complex and requires more joins compared to Star schema.

  • Star schema is easier to understand and query, making it more suitable for smaller datasets.

  • Snowflake schema is more suitable for larger datasets with complex relationships.

Add your answer

Q360. difference between stlc and sdlc

Ans.

STLC is a subset of SDLC that focuses on testing while SDLC covers the entire software development process.

  • SDLC is a broader term that covers all the phases of software development including planning, designing, coding, testing, and maintenance.

  • STLC is a subset of SDLC that focuses only on the testing phase.

  • SDLC is a sequential process while STLC can be iterative.

  • SDLC is a framework while STLC is a process.

  • Examples of SDLC models are Waterfall, Agile, and DevOps while STLC mo...read more

Add your answer

Q361. Explain assets in balance sheet

Ans.

Assets in balance sheet represent resources owned by a company that have economic value.

  • Assets are items of value owned by a company, such as cash, inventory, equipment, and investments.

  • They are listed on the balance sheet and categorized as current assets (e.g. cash, accounts receivable) or non-current assets (e.g. property, plant, equipment).

  • Assets are typically listed in order of liquidity, with the most liquid assets (e.g. cash) listed first.

  • The total assets of a company ...read more

Add your answer

Q362. Difference between audit and accounting

Ans.

Audit focuses on verifying financial information for accuracy and compliance, while accounting involves recording, classifying, and summarizing financial transactions.

  • Audit is an independent examination of financial information, whereas accounting involves the preparation and maintenance of financial records.

  • Auditors provide assurance on the accuracy and reliability of financial statements, while accountants are responsible for preparing those statements.

  • Audit is typically pe...read more

Add your answer

Q363. Life cycle around Static Constructor

Ans.

Static constructor is called only once during the lifetime of a class.

  • Static constructor is used to initialize static fields of a class.

  • It is called automatically before the first instance of the class is created.

  • It cannot be called directly and cannot have any access modifiers.

  • It can be used to perform one-time initialization tasks such as setting up a database connection.

  • If an exception is thrown during static constructor execution, the type becomes unusable.

Add your answer

Q364. How to recreate outlook

Ans.

Recreating Outlook involves developing a comprehensive email client with features like email management, calendar integration, and task tracking.

  • Design and develop a user-friendly interface for email management

  • Implement features like sending, receiving, and organizing emails

  • Integrate a calendar system for scheduling and managing appointments

  • Include task tracking functionality for managing to-do lists

  • Ensure compatibility with various email protocols (POP, IMAP)

  • Implement robust...read more

Add your answer

Q365. Process for filing tax return

Ans.

The process for filing tax return involves gathering necessary documents, filling out forms accurately, and submitting them to the appropriate agency.

  • Gather all necessary documents such as W-2s, 1099s, and receipts

  • Fill out tax forms accurately, including any deductions or credits

  • Submit tax forms to the appropriate agency, either electronically or by mail

  • Pay any taxes owed or receive a refund if applicable

Add your answer

Q366. Difference between RFP and RFQ

Ans.

RFP is a request for proposal while RFQ is a request for quotation.

  • RFP is used when the buyer wants to receive proposals from potential vendors to solve a problem or fulfill a need.

  • RFQ is used when the buyer wants to receive quotes from potential vendors for a specific product or service.

  • RFP is more detailed and requires vendors to provide a solution to the problem or need, while RFQ is more straightforward and requires vendors to provide a price for the product or service.

  • RF...read more

Add your answer

Q367. Why compliance?

Ans.

Compliance ensures adherence to laws, regulations, and company policies to mitigate risks and maintain ethical standards.

  • Ensures legal and regulatory requirements are met

  • Mitigates risks of fines, penalties, and reputational damage

  • Maintains ethical standards and corporate governance

  • Promotes trust and transparency with stakeholders

Add your answer

Q368. What is form 3CEB

Ans.

Form 3CEB is a report that must be filed by certain taxpayers in India to provide details of international transactions.

  • Form 3CEB is required to be filed by taxpayers who have entered into specified international transactions.

  • It must be filed by taxpayers whose total international transactions exceed a specified monetary limit.

  • The form requires detailed information about the nature of transactions, parties involved, and transfer pricing methods used.

  • Form 3CEB helps tax author...read more

Add your answer

Q369. What is Cash flow?

Ans.

Cash flow is the movement of money in and out of a business, showing how much cash is generated or spent over a specific period of time.

  • Cash flow is crucial for assessing a company's financial health and liquidity.

  • Positive cash flow means more money is coming in than going out, while negative cash flow indicates the opposite.

  • Examples of cash flow include revenue from sales, operating expenses, investments, and financing activities.

Add your answer

Q370. Recent business awareness

Ans.

I have been keeping up with the latest business news and trends through various sources.

  • I regularly read business publications such as Forbes, Bloomberg, and The Wall Street Journal.

  • I attend industry conferences and networking events to stay informed about the latest developments.

  • I follow thought leaders and influencers on social media platforms like LinkedIn and Twitter.

  • Recently, I have been following the impact of the COVID-19 pandemic on businesses and the economy.

  • I am als...read more

Add your answer

Q371. Syntax of xpath

Ans.

XPath is a query language for selecting nodes from an XML document.

  • XPath uses path expressions to navigate through elements and attributes in an XML document

  • Syntax includes using slashes to separate elements, square brackets for conditions, and @ symbol for attributes

  • Examples: //bookstore/book[1] selects the first book element under the bookstore element

Add your answer

Q372. Experience in ESG reporting

Ans.

I have extensive experience in ESG reporting, including developing frameworks, conducting assessments, and producing reports.

  • Developed ESG reporting frameworks for clients to align with industry standards and best practices

  • Conducted ESG assessments to identify key performance indicators and areas for improvement

  • Produced comprehensive ESG reports that communicate sustainability efforts and impact to stakeholders

Add your answer

Q373. Current CTC and expectations

Ans.

Current CTC is $100,000 and expectations are $120,000.

  • Current CTC: $100,000

  • Expectations: $120,000

  • Looking for a 20% increase in salary

Add your answer

Q374. explain PEP and examples

Ans.

PEP stands for Politically Exposed Person, refers to individuals who are or have been entrusted with prominent public functions.

  • PEPs are considered higher risk for potential involvement in bribery, corruption, and money laundering due to their position of influence.

  • Examples of PEPs include government officials, heads of state, senior politicians, and high-ranking military officers.

  • Financial institutions are required to conduct enhanced due diligence on PEPs to mitigate the as...read more

Add your answer

Q375. what is injection

Ans.

Injection is a technique used to introduce code or data into a computer program or system.

  • Injection is commonly used in cyber attacks to exploit vulnerabilities in software.

  • Types of injection include SQL injection, cross-site scripting (XSS), and command injection.

  • Injection attacks can lead to unauthorized access, data theft, and system compromise.

Add your answer

Q376. Profeciency in Vlookup and hlookup

Ans.

Vlookup and hlookup are Excel functions used to search for specific data in a table.

  • Vlookup searches for a value in the first column of a table and returns a value in the same row from a specified column.

  • Hlookup searches for a value in the first row of a table and returns a value in the same column from a specified row.

  • Both functions are commonly used in data analysis and reporting.

  • Example: =VLOOKUP(A2, B2:D10, 3, FALSE) - searches for the value in cell A2 in the range B2:D10...read more

Add your answer

Q377. Difference between esg and csr

Ans.

ESG focuses on environmental, social, and governance factors while CSR focuses on corporate social responsibility.

  • ESG stands for environmental, social, and governance criteria used to evaluate a company's sustainability and ethical impact.

  • CSR stands for corporate social responsibility and refers to a company's initiatives to assess and take responsibility for its impact on society and the environment.

  • ESG factors are used by investors to evaluate the sustainability and ethical...read more

Add your answer

Q378. Concept of revenue recognition

Ans.

Revenue recognition is the process of recording revenue in the financial statements when it is earned, regardless of when cash is received.

  • Revenue is recognized when it is realized or realizable and earned.

  • The amount of revenue to be recognized is based on the consideration received or expected to be received in exchange for goods or services.

  • Revenue recognition principles are outlined in accounting standards such as ASC 606 (US GAAP) and IFRS 15.

  • Examples include recognizing ...read more

Add your answer

Q379. Types of Audit opinions

Ans.

Types of audit opinions include unqualified, qualified, adverse, and disclaimer.

  • Unqualified opinion: no material misstatements found

  • Qualified opinion: some issues found but not significant enough to affect overall opinion

  • Adverse opinion: significant issues found that affect overall opinion

  • Disclaimer: auditor unable to form an opinion due to lack of information or restrictions on scope

  • Examples: unqualified - clean audit report, adverse - going concern issues

Add your answer

Q380. Tools worked on. AV, DLP

Ans.

I have worked extensively on AV and DLP tools.

  • Implemented and managed various AV solutions like Symantec Endpoint Protection, McAfee VirusScan, and Windows Defender

  • Configured and monitored DLP tools like Symantec DLP and McAfee DLP to prevent data loss

  • Conducted regular vulnerability assessments and penetration testing using AV tools

  • Developed and implemented security policies and procedures for AV and DLP tools

  • Provided training and support to end-users on AV and DLP tools

Add your answer

Q381. what is power query?

Ans.

Power Query is a data connection technology that enables you to discover, connect, combine, and refine data across a wide variety of sources.

  • Power Query is a tool in Microsoft Excel and Power BI used for data transformation and manipulation.

  • It allows users to import data from various sources, clean and transform the data, and load it into the desired destination.

  • Power Query uses a graphical user interface to simplify the process of data preparation.

  • It supports a wide range of...read more

Add your answer

Q382. Explain debt to equity

Ans.

Debt to equity ratio compares a company's total debt to its shareholders' equity.

  • Debt to equity ratio is calculated by dividing total debt by total equity.

  • It shows how much debt a company is using to finance its assets compared to the amount of equity.

  • A high debt to equity ratio indicates higher financial risk, while a low ratio indicates lower risk.

  • For example, if a company has $1 million in debt and $2 million in equity, the debt to equity ratio would be 0.5.

Add your answer

Q383. What is Ebitda ?

Add your answer

Q384. What is dbms and sql

Ans.

DBMS stands for Database Management System, which is a software that manages databases. SQL is a language used to interact with databases.

  • DBMS is a software that allows users to create, retrieve, update, and manage databases.

  • SQL (Structured Query Language) is a language used to communicate with and manipulate databases.

  • Examples of popular DBMS include MySQL, Oracle, and SQL Server.

  • Examples of SQL commands include SELECT, INSERT, UPDATE, and DELETE.

Add your answer

Q385. Provisions of Tax

Ans.

Provisions of Tax refer to estimated amounts set aside to cover potential future tax liabilities.

  • Provisions of Tax are made based on current tax laws and regulations.

  • They are recorded as liabilities on the balance sheet until the actual tax liability is determined.

  • Examples include provisions for income tax, sales tax, and property tax.

  • Provisions of Tax help companies avoid unexpected tax bills and ensure compliance with tax laws.

Add your answer

Q386. Customer facing roles

Ans.

Customer facing roles involve interacting with customers to address their needs and concerns.

  • Effective communication skills are essential

  • Ability to remain calm and professional under pressure

  • Empathy and understanding towards customer's concerns

  • Problem-solving skills to resolve issues efficiently

  • Product knowledge to provide accurate information to customers

Add your answer

Q387. Methods in transfer pricing

Ans.

Transfer pricing methods are used to determine the price at which goods and services are transferred between related entities.

  • Transfer pricing methods include comparable uncontrolled price, resale price, cost plus, and transactional net margin methods.

  • The choice of method depends on the nature of the transaction and the availability of data.

  • Each method has its own set of criteria and requirements for application.

  • The arm's length principle is the key guiding principle in trans...read more

Add your answer

Q388. Explain ML algorithm.

Ans.

ML algorithm is a set of rules and statistical models that enable machines to learn from data and make predictions or decisions.

  • ML algorithm uses statistical techniques to identify patterns in data and make predictions or decisions.

  • It involves training a model on a dataset and then using that model to make predictions on new data.

  • There are various types of ML algorithms such as supervised learning, unsupervised learning, and reinforcement learning.

  • Examples of ML algorithms in...read more

Add your answer

Q389. What is vapt process

Ans.

VAPT stands for Vulnerability Assessment and Penetration Testing. It is a process of identifying and evaluating security vulnerabilities in a system.

  • Vulnerability Assessment involves scanning the system for potential weaknesses and vulnerabilities.

  • Penetration Testing involves simulating attacks to exploit those vulnerabilities and assess the system's security.

  • The process helps organizations identify and address security risks before they can be exploited by malicious actors.

  • C...read more

Add your answer

Q390. What is smart meter

Ans.

A smart meter is a device that records consumption of electric energy in intervals of an hour or less and communicates that information back to the utility for monitoring and billing purposes.

  • Smart meters provide real-time data on energy usage, allowing consumers to make more informed decisions about their electricity consumption.

  • They can also enable time-of-use pricing, where electricity rates vary depending on the time of day.

  • Smart meters can help utilities detect outages m...read more

Add your answer

Q391. explain hawala?

Ans.

Hawala is an informal system of transferring money without actually moving it, often used in countries with limited banking infrastructure.

  • Hawala involves transferring money through a network of brokers or agents.

  • Transactions are based on trust and often involve minimal documentation.

  • It is commonly used in countries where formal banking systems are not easily accessible.

  • Hawala can be used for legitimate purposes such as remittances, but also for illegal activities like money ...read more

Add your answer

Q392. What is form 1099

Ans.

Form 1099 is a tax form used to report various types of income other than wages, salaries, and tips.

  • Form 1099 is used to report income such as freelance earnings, interest, dividends, and government payments.

  • There are different types of Form 1099, such as 1099-MISC for miscellaneous income and 1099-INT for interest income.

  • Recipients of Form 1099 must report the income on their tax return and may owe taxes on it.

  • Form 1099 is typically issued by the entity that paid the income ...read more

Add your answer

Q393. What is intermediary

Ans.

An intermediary is a person or organization that acts as a link between two parties to facilitate communication or transactions.

  • Intermediaries can help in negotiations and resolving conflicts between parties.

  • Examples include brokers, agents, and middlemen in business transactions.

  • They can provide valuable expertise and resources to both parties involved.

Add your answer

Q394. How your carrier

Ans.

I have built my career through a combination of education, experience, and continuous learning.

  • Started my career in marketing after completing my MBA

  • Transitioned into management roles after gaining experience in various departments

  • Continuously sought out opportunities for professional development and training

  • Currently working towards a certification in leadership and management

  • Have successfully led teams to achieve company goals and objectives

Add your answer

Q395. how esg evolved

Ans.

ESG has evolved from a niche concept to a mainstream consideration for investors and companies alike.

  • ESG (Environmental, Social, and Governance) factors were initially seen as non-financial metrics but are now recognized as crucial for long-term sustainability and risk management.

  • Investors are increasingly incorporating ESG criteria into their decision-making processes to assess the overall performance and impact of companies.

  • Companies are now more focused on ESG initiatives ...read more

Add your answer

Q396. Fundamentals of auditing

Ans.

Fundamentals of auditing involve understanding the principles, procedures, and standards used in examining financial records.

  • Auditing involves examining financial records to ensure accuracy and compliance with laws and regulations

  • Key principles of auditing include independence, integrity, objectivity, and confidentiality

  • Auditors must follow specific procedures and standards set by regulatory bodies like the PCAOB or AICPA

  • Examples of auditing procedures include testing transac...read more

Add your answer

Q397. Tropic on favourite game.

Ans.

My favourite game is chess.

  • I enjoy the strategic thinking and planning involved in each move.

  • It's a game that requires both patience and quick thinking.

  • I also appreciate the history and tradition behind the game.

  • For example, I love studying the games of famous chess players like Bobby Fischer and Garry Kasparov.

  • Overall, chess is a challenging and rewarding game that I always enjoy playing.

Add your answer

Q398. Golden rules of Accounting

Ans.

The golden rules of accounting are basic principles that guide the process of recording financial transactions.

  • The golden rules include: Debit what comes in, Credit what goes out; Debit the receiver, Credit the giver; Debit expenses and losses, Credit income and gains.

  • These rules help ensure that financial transactions are accurately recorded and classified in the accounting system.

  • For example, when a company receives cash from a customer, the cash account is debited (increas...read more

Add your answer

Q399. Types of taxes in India.

Ans.

Types of taxes in India include income tax, goods and services tax (GST), corporate tax, customs duty, and excise duty.

  • Income tax is levied on individuals and businesses based on their income levels.

  • Goods and Services Tax (GST) is a value-added tax levied on most goods and services sold for domestic consumption.

  • Corporate tax is levied on the profits earned by companies operating in India.

  • Customs duty is a tax imposed on goods imported into India from other countries.

  • Excise du...read more

Add your answer

Q400. SQL to find duplicates

Ans.

SQL query to find duplicates in a table

  • Use GROUP BY and HAVING clause to identify duplicates

  • Select the columns you want to check for duplicates

  • Use COUNT() function to count the occurrences of each group

Add your answer
1
2
3
4
5
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Bhuvaneshwari Enterprise

based on 632 interviews
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.8
 • 2k Interview Questions
3.9
 • 538 Interview Questions
3.9
 • 212 Interview Questions
4.2
 • 165 Interview Questions
4.1
 • 152 Interview Questions
3.3
 • 151 Interview Questions
View all
Top KPMG India Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter