NTT Data Information Processing Services
300+ Interview Questions and Answers
Q1. On an average, how many invoices can you process in a day?
I can process around 50-60 invoices per day depending on the complexity.
The number of invoices processed can vary based on the complexity of the invoices.
I have experience in using various invoice processing software which helps in increasing the efficiency.
I prioritize the invoices based on their due dates and ensure timely processing.
Q2. What is ost and pst in Outlook, what is distribution list and mailbox, how to create new data file in Outlook, how to fix bsod issue in windows OS, what is bios and key to enter in bios, what is office 365, dif...
read moreQuestions related to Outlook, Windows OS, and Office 365.
OST and PST are file formats used by Outlook to store data.
Distribution list is a group of email addresses used for sending emails to multiple recipients.
Mailbox is a storage location for emails and other data in Outlook.
To create a new data file in Outlook, go to File > New > Outlook Data File.
BSOD issue in Windows OS can be fixed by updating drivers or running system diagnostics.
BIOS is a firmware that initializes har...read more
Q3. What is the KPI in your organisation?
The KPI in our organization is customer satisfaction.
Customer satisfaction is measured through surveys and feedback.
We track the percentage of satisfied customers on a monthly basis.
We also monitor the number of customer complaints and aim to reduce them.
Improving customer satisfaction is a key focus for our team.
Q4. What is the difference between SLA and TAT?
SLA stands for Service Level Agreement, while TAT stands for Turnaround Time.
SLA is a contractual agreement between a service provider and a customer, defining the level of service expected.
TAT refers to the time taken to complete a specific task or process.
SLA focuses on the quality and availability of services, while TAT focuses on the speed of completing tasks.
SLA is usually measured in terms of percentage uptime or response time, while TAT is measured in hours, minutes, o...read more
Q5. if I give you a box full of pencils..in how many ways can you use it
There are numerous ways to use a box full of pencils depending on the context and purpose.
Pencils can be used for writing, drawing, sketching, coloring, shading, and more.
They can be used for artistic purposes, schoolwork, office work, or personal use.
Pencils can also be used as a tool for measurement, as a makeshift stylus, or even as a musical instrument.
The number of ways to use a box full of pencils is virtually limitless and depends on the creativity and imagination of t...read more
Q6. What is the TAT for processing an invoice?
The TAT for processing an invoice varies depending on the complexity of the invoice and the company's internal processes.
The TAT can range from a few days to several weeks.
Factors that can affect the TAT include the accuracy of the invoice, the approval process, and the payment terms.
Automating the invoice processing system can help reduce the TAT and improve efficiency.
Regularly reviewing and optimizing the invoice processing system can also help reduce the TAT.
It is importa...read more
Q7. -Tell me about MSMP workflow and what is the usage of BRF+ application?
MSMP workflow is a tool for defining and executing approval processes in SAP systems. BRF+ is an application used to create business rules.
MSMP workflow is used to define and execute approval processes for various business scenarios in SAP systems.
It allows for the creation of complex approval workflows with multiple levels of approval and parallel processing.
BRF+ is an application used to create business rules that can be used in MSMP workflows.
These rules can be used to det...read more
Q8. What are the different types of Database management systems. What are the Database languages ? What is the difference between drop, delete and truncate?
Different types of DBMS, DB languages & difference between drop, delete & truncate.
Types of DBMS: Relational, NoSQL, Object-oriented, Hierarchical, Network, etc.
Database languages: SQL, PL/SQL, T-SQL, etc.
DROP: Deletes a table and its data, cannot be rolled back.
DELETE: Deletes rows from a table, can be rolled back.
TRUNCATE: Deletes all rows from a table, cannot be rolled back.
Q9. Explain me Raid? how many raid are there? which raid is best to use?
RAID stands for Redundant Array of Independent Disks. It is a data storage technology that combines multiple physical disks into a single logical unit.
There are several types of RAID, including RAID 0, RAID 1, RAID 5, RAID 6, RAID 10, and more.
RAID 0 offers no redundancy but provides improved performance by striping data across multiple disks.
RAID 1 provides mirroring of data across two disks, offering redundancy but no performance improvement.
RAID 5 uses striping with parity...read more
Q10. -Unable to submit a GRC ARM request? How do you troubleshoot?
To troubleshoot GRC ARM request submission issue, follow these steps:
Check if the user has the necessary authorization to submit the request
Verify if the request is complete and all mandatory fields are filled
Check if there are any system errors or connectivity issues
Review the GRC logs to identify any errors or warnings
If the issue persists, escalate to the GRC support team for further investigation
Q11. -Custom Tcodes and how do get risk analysis for custom tcodes?
Risk analysis for custom tcodes can be done using SAP GRC Access Control.
Create custom roles and assign tcodes to them
Run risk analysis using SAP GRC Access Control
Analyze the results and mitigate any identified risks
Regularly review and update custom roles and tcodes
Consider using SAP GRC Access Control's continuous compliance monitoring feature
Q12. PP production process flow Co product By product Difference In Bom how to create Bill of material of non stock items Important views of material master What is master data T code for demand management Productio...
read moreQuestions related to SAP PP Consultant role including production process flow, BOM creation, material master views, demand management, production execution, and MRP run differences.
PP production process flow involves planning, execution, and monitoring of production processes.
Co-product and by-product are two types of secondary products produced during the main production process.
Non-stock items can be included in BOM by creating a phantom item or using a material type that a...read more
Q13. How to raise the ticket , which type of ticket portal you are using
Q14. What is outlook? Explain some basic feature and how to open this in safe mode?
Outlook is a personal information manager from Microsoft. It is used for email, calendar, task management, and contacts.
Outlook is used for email communication, scheduling appointments, managing tasks, and storing contacts.
It has a user-friendly interface with customizable features.
Outlook can be opened in safe mode by holding down the CTRL key while clicking on the Outlook icon.
Safe mode is useful for troubleshooting issues with Outlook, as it disables any add-ins or customi...read more
Q15. Powerbuilder 1.What is lookupdisplay function and when do we use datawindow 2.how do you debug and track errors in powerbuilder 3. Difference between quick select and Sql select data source 4.how to connect wit...
read moreAnswers to questions related to Powerbuilder for Senior Software Developer position.
lookupdisplay function is used to display a value from a related table in a datawindow
Debugging and error tracking can be done using the Powerbuilder debugger and log files
Quick select is used for simple queries while SQL select data source is used for complex queries
Powerbuilder can connect to different databases using ODBC or native drivers
Commit or rollback can be done in triggers using SQL...read more
Q16. Give a real time example of Inheritance, Polymorphism, Abstraction and Encapsulation.
Real-time examples of OOP concepts
Inheritance: A car is a vehicle, inheriting properties of a vehicle
Polymorphism: A shape can be a square or a circle, both implementing the same area method
Abstraction: A TV remote has buttons to perform actions, but the user doesn't need to know how it works internally
Encapsulation: A bank account has private data like balance, which can only be accessed through public methods
Q17. Performance of virtual machine ( from VC, ESXtop), critical issue faced, Dvswitch/standard switch difference, Network security/teaming policy, full scenario for PSC, Virtual center upgrade and what ever you men...
read moreThe question covers various aspects of virtual machine performance, network security, and upgrades.
Virtual machine performance can be monitored using tools like VC and ESXtop.
Critical issues faced can include resource contention, network congestion, and storage latency.
Dvswitch and standard switch have differences in terms of features and capabilities.
Network security can be ensured through policies like teaming and VLANs.
PSC and Virtual Center upgrades require careful planni...read more
Q18. A scrum master in Agile is equivalent to which position in water fall?
Scrum Master in Agile is equivalent to Project Manager in Waterfall.
Scrum Master is responsible for facilitating the Agile process and ensuring the team follows it.
Project Manager is responsible for managing the project from start to finish in Waterfall.
Both roles involve managing the team and ensuring the project is completed on time and within budget.
However, the approach and methodology used are different in Agile and Waterfall.
Q19. Write a SQL query to to print all the rows in a table that has no match in a second table.
SQL query to print rows with no match in a second table
Use LEFT JOIN to join the two tables
Filter the rows where the second table's primary key is NULL
SELECT the columns from the first table
Q20. What is service management? How do you handle escalations and difficult customers? What is a Service Level Agreement (SLA), and what are the different types of SLAs? Current job responsibilities and deliverable...
read moreService management involves handling customer escalations, ensuring SLAs are met, and delivering high-quality service.
Service management involves overseeing the delivery of services to customers, ensuring their needs are met and issues are resolved efficiently.
Handling escalations involves addressing customer complaints or issues that have not been resolved through regular channels, and finding solutions to satisfy the customer.
Dealing with difficult customers requires patien...read more
Q21. What is the formula of simple interest?
The formula for simple interest is I = P * R * T
Simple interest is calculated using the formula I = P * R * T
I represents the interest amount, P is the principal amount, R is the rate of interest, and T is the time period
For example, if the principal amount is $1000, the rate of interest is 5%, and the time period is 2 years, the simple interest would be $100
Q22. Which type of email client is using in your company
Q23. -Difference between Centralized and Decentralized EAM system? Which is preferable?
Centralized EAM system has a single database while Decentralized EAM system has multiple databases.
Centralized EAM system is easier to manage and maintain.
Decentralized EAM system provides more flexibility and autonomy to individual departments.
Preference depends on the organization's size, structure, and requirements.
Q24. What is the difference between final, finally and finalise?
Final, finally and finalise are related to completion or conclusion, but have different meanings and usage.
Final is an adjective used to describe the last or ultimate stage of something.
Finally is an adverb used to indicate the end of a process or event after a long wait or delay.
Finalise is a verb used to complete or finish something, often with a formal or official process.
Examples: The final exam, finally finished the project, finalise the contract.
Q25. What is the formula of (a+b)2?
The formula of (a+b)2 is a^2 + 2ab + b^2.
The formula is derived using the distributive property of multiplication over addition.
It can also be expanded as (a+b)(a+b) or a(a+b) + b(a+b).
The result is a quadratic expression with three terms.
Q26. What if product owner adds a user story in the middle of the sprint ?
It is not recommended to add user stories in the middle of the sprint.
Product owner should be advised to wait until the next sprint planning meeting to add the user story.
If the user story is critical, the team should discuss and decide if it can be accommodated within the current sprint.
Adding user stories in the middle of the sprint can disrupt the team's focus and impact the sprint goal.
The Scrum Master should facilitate a discussion with the team and product owner to dete...read more
Q27. How to identify the cost of ospf ? What are the bgp attributes? How stp works
Identifying OSPF cost, BGP attributes, and STP working
OSPF cost is calculated based on the bandwidth of the link
BGP attributes include AS path, next hop, local preference, etc.
STP works by selecting a root bridge and blocking redundant paths
OSPF cost can be manually configured using the 'ip ospf cost' command
BGP attributes are used to determine the best path for routing
STP uses BPDU messages to exchange information and build a loop-free topology
Q28. Select columnname as 1 from employee table,Output if employee table contain 100 record?
The question is asking to select a column named 'columnname' as '1' from the employee table and provide the output if the table contains 100 records.
The column 'columnname' does not exist in the employee table, so the query will result in an error.
The value '1' will be selected for each record in the employee table, resulting in 100 rows with the value '1'.
The output will be a single column with 100 rows, all containing the value '1'.
Q29. write the idea or algorithm for d program of fibonacci series
Fibonacci series is a sequence of numbers where each number is the sum of the two preceding ones.
Start with 0 and 1 as the first two numbers
Add the previous two numbers to get the next number
Repeat until desired number of terms
Q30. What is jvm,jdk,jre Finall, finally, finalize key words String, string builder, string buffer, Code output Difference between hash map,hast set Advantages of array list and linked list And program Oops concepts...
read moreJava Developer interview questions covering JVM, keywords, data structures, OOPs concepts, and Java features.
JVM is Java Virtual Machine that executes Java bytecode
JDK is Java Development Kit that includes JRE and development tools
JRE is Java Runtime Environment that provides runtime environment for Java programs
finally block is used to execute code after try-catch block
finalize method is called by garbage collector before object is destroyed
String is immutable, StringBuilder...read more
Q31. When does APEX CPU Limit Exceeded error happens. What's the best practice to avoid getting this error?
APEX CPU Limit Exceeded error happens when code consumes too much CPU time. Best practices include optimizing code, reducing loops, and using asynchronous processing.
Avoid using nested loops and optimize code for better performance
Use asynchronous processing like @future or Queueable to offload CPU intensive tasks
Limit the use of SOQL queries inside loops to reduce CPU consumption
Q32. Write a SOQL query to fetch the values of description field from the Account. Why does "the description field cannot be filtered in the query call"?
SOQL query to fetch description field from Account and reason for inability to filter
SOQL query: SELECT Description FROM Account
Description field is not filterable because it is a long text field
Long text fields cannot be filtered in SOQL queries
Q33. What's the use of @track decorator. Is it mandatory to explicitly use it? If yes, for which use case?
The @track decorator in Salesforce is used to track changes to a property in a Lightning web component.
Used to make a property reactive and trigger re-renders when its value changes
Not mandatory but recommended for properties that need to be reactive
Use @track when you want changes to a property to be reflected in the UI
Q34. How will you create a custom adobe Form and assign it to output type?
To create a custom Adobe Form and assign it to an output type in SAP ABAP, you can use transaction code SFP.
Create a custom Adobe Form using transaction code SFP
Assign the Adobe Form to an output type in transaction code NACE
Configure the output type to use the custom Adobe Form
Test the output type to ensure the custom Adobe Form is being used
Q35. How to installing the application in your client system
Q36. What is selenium and what sort of applications we use this for?
Selenium is a popular open-source tool used for automating web browsers.
Selenium is used for automating web application testing.
It supports multiple programming languages like Java, Python, C#, etc.
Selenium can interact with different browsers like Chrome, Firefox, Safari, etc.
It can automate repetitive tasks such as form filling, clicking buttons, navigating through web pages, etc.
Selenium is widely used in software development for regression testing and functional testing.
Q37. if disk is full what will u do?
Free up disk space by identifying and removing unnecessary files.
Identify large files and delete them
Remove old log files
Clear cache and temporary files
Compress large files
Move files to another disk or server
Q38. What is Wcag 2.2 ? What more new guidelines it has
WCAG 2.2 is the latest version of Web Content Accessibility Guidelines with new guidelines for making web content more accessible.
WCAG 2.2 includes 9 new success criteria and updates to existing ones
New success criteria include requirements for mobile accessibility, contrast, and language clarity
WCAG 2.2 also emphasizes the need for accessibility in emerging technologies like virtual and augmented reality
WCAG 2.2 is not yet an official standard, but is in draft form for publi...read more
Q39. what version of redhat have you worked on?
I have worked on Red Hat Enterprise Linux versions 6, 7, and 8.
I have experience with installation, configuration, and maintenance of Red Hat Enterprise Linux servers.
I have worked with Red Hat Enterprise Linux 6, 7, and 8 in both physical and virtual environments.
I have experience with package management, user management, and security hardening on Red Hat Enterprise Linux.
I have also worked with Red Hat Satellite for patch management and automation.
Examples of projects I hav...read more
Q40. ICD 10 cm full form and format
ICD 10 cm stands for International Classification of Diseases, 10th Revision, Clinical Modification.
ICD 10 cm is a coding system used to classify and code diagnoses, symptoms, and procedures in healthcare.
It consists of alphanumeric codes that are used to describe medical conditions and procedures.
The format of ICD 10 cm codes is a combination of letters and numbers, with up to 7 characters in length.
For example, the code for a heart attack is I21.9.
ICD 10 cm is used by healt...read more
Q41. How do you implement custom middleware in .net core?
Custom middleware in .NET Core can be implemented by creating a class that implements the IMiddleware interface and adding it to the application pipeline.
Create a class that implements the IMiddleware interface
Implement the InvokeAsync method in the middleware class to handle the request processing logic
Add the custom middleware to the application pipeline in the Configure method of the Startup class
Q42. What is Test Prioritization and How we apply to our Test Case?
Test prioritization is the process of determining the order in which tests should be executed based on their importance and risk.
Tests are prioritized based on their impact on the system and the likelihood of failure.
Prioritization helps to ensure that critical defects are identified and fixed early in the testing process.
Factors such as business requirements, user expectations, and regulatory compliance are considered when prioritizing tests.
Test cases with high priority are...read more
Q43. what is the difference between zombie and orphan?
Zombie is a terminated process that still has an entry in the process table, while orphan is a child process whose parent has terminated.
Zombie process is waiting for its parent to read its exit status
Orphan process is adopted by init process (PID 1)
Zombie process can be removed by killing its parent process
Orphan process can continue running even after its parent has terminated
Q44. What is Networking how dns cluster works in Linux?
Networking is the practice of connecting devices to share resources. DNS cluster in Linux is a group of DNS servers that work together.
Networking involves connecting devices to share resources such as files, printers, and internet access.
DNS cluster in Linux is a group of DNS servers that work together to provide high availability and load balancing for DNS queries.
DNS cluster can be configured using tools like BIND and PowerDNS.
DNS cluster can improve the performance and rel...read more
Q45. What checks did you perform any network device down ?
I perform various checks to identify the cause of network device down.
Check if the device is powered on and connected to the network
Ping the device to see if it responds
Check the device logs for any errors or warnings
Check the network switch to see if the port is active
Check if there are any network outages or maintenance scheduled
Contact the device owner or vendor for further assistance
Q46. 1)What is switch? 2)What is the use of switch? 3)In which layer switch will be work? 4)Which is the difference between router and switch? 5)what are the type of cables?
Q47. -How do you import roles in GRC?
Roles can be imported in GRC using the Role Upload functionality.
Navigate to Access Management > Role Upload
Select the system and upload the role file in CSV format
Map the fields and validate the data
Submit the job for import
Q48. 1)What is the main function of router ? 2) In which layer router will be work? 3)what is Mack address? 4) what is IP and type of IP?
Q49. What is AD? What is Bitlocker? What is SCCM?
AD stands for Active Directory, a directory service developed by Microsoft for managing network resources.
AD is used to store information about network objects such as users, computers, and groups.
It provides centralized authentication and authorization services for network resources.
AD uses a hierarchical structure with domains, trees, and forests.
It allows administrators to manage and control access to resources in a network environment.
Examples of AD tasks include user acc...read more
Q50. Draft email to the customer for delay in Service Delivery
Draft email to customer for delay in service delivery
Apologize for the delay and explain the reason
Provide a new estimated delivery date
Offer compensation or discount for the inconvenience caused
Assure the customer that steps are being taken to avoid such delays in future
End the email with a positive note and thank the customer for their patience
Q51. How you deploying the window patch
Q52. How to handle scenario where you need to fetch deatils from infinite scrolling table and what condition will you stop the execution
To handle fetching details from infinite scrolling table, implement lazy loading and set a condition to stop execution based on scroll position or data availability.
Implement lazy loading to fetch data as user scrolls down the table
Set a condition to stop execution based on scroll position or reaching end of data
Use intersection observer to detect when the table is in view and trigger data fetching
Consider implementing a 'Load More' button to control data fetching manually
Q53. What will be the troubleshooting steps if a Monitor is not working?
Troubleshooting steps for a non-working monitor
Check power connection and ensure monitor is plugged in
Verify monitor is turned on and brightness settings are adjusted
Try connecting monitor to a different power source or computer
Check for loose cables or damaged ports
Restart computer and check display settings
Q54. Program for pattern printing ,bubble sort
Program to print a pattern and implement bubble sort on an array of strings.
For pattern printing, use nested loops to print the desired pattern.
For bubble sort, compare adjacent elements and swap if necessary.
Use a loop to iterate through the array until no more swaps are needed.
Q55. How to get the 5th top position data in Sql?
Use the OFFSET and FETCH clauses in SQL to get the 5th top position data.
Use the ORDER BY clause to sort the data in descending order.
Use the OFFSET clause to skip the first 4 rows.
Use the FETCH clause to retrieve only the next row after skipping the first 4 rows.
Q56. what is IP and how IP address is represented
IP stands for Internet Protocol. An IP address is a unique numerical label assigned to each device connected to a computer network.
IP stands for Internet Protocol
IP address is a unique numerical label assigned to devices on a network
IP addresses are represented in decimal format, such as 192.168.1.1
There are two versions of IP addresses - IPv4 and IPv6
Q57. What is the difference between Citrix and VPN?
Citrix is a software platform used for virtualization and remote access, while VPN is a secure network connection that allows users to access a private network remotely.
Citrix is a software platform that provides virtualization and remote access solutions.
VPN (Virtual Private Network) is a secure network connection that allows users to access a private network remotely.
Citrix is often used for accessing applications and desktops remotely, while VPN is used for securely connec...read more
Q58. Explain me what is network bonding?
Network bonding is the process of combining multiple network interfaces into a single logical interface.
Network bonding provides redundancy and increased bandwidth.
There are different bonding modes such as active-backup, balance-rr, and LACP.
Bonding can be configured using the ifenslave utility or through network configuration files.
Examples of network interfaces that can be bonded include Ethernet, Wi-Fi, and InfiniBand.
Bonding can be used in high availability setups or for ...read more
Q59. Do you have experience in handling L1 related tickets for Storage/Backup?
Yes, I have experience in handling L1 related tickets for Storage/Backup.
Yes, I have experience in resolving L1 related tickets for Storage/Backup.
I have worked on troubleshooting storage and backup issues at the L1 level.
I am familiar with common storage and backup solutions and their troubleshooting methods.
Q60. Can you tell me where do we use procurement in our daily life
Q61. What is difference between switch and router
Switch is used to connect devices within a network, while a router is used to connect different networks.
Switch operates at the data link layer of the OSI model, while router operates at the network layer.
Switch forwards data packets based on MAC addresses, while router forwards packets based on IP addresses.
Switch is typically used in LANs to create a network segment, while router is used to connect multiple networks.
Switch provides high-speed data transfer within a network,...read more
Q62. How will you perform accessibility testing
I will perform accessibility testing by using both manual and automated testing methods.
Conduct manual testing to evaluate accessibility features such as keyboard navigation, color contrast, and screen reader compatibility
Use automated testing tools like Axe, Wave, and Lighthouse to identify accessibility issues
Collaborate with developers and designers to ensure accessibility is integrated throughout the development process
Refer to accessibility guidelines such as WCAG 2.1 to...read more
Q63. what are the key configuration steps involved to create Automatic payment program
Key configuration steps for creating Automatic payment program in SAP Fico
Define payment methods in transaction code FBZP
Set up house banks in transaction code FI12
Configure payment methods per company code in transaction code FBZP
Define payment methods per country in transaction code OBVC4
Assign payment methods to vendors in transaction code XK02
Q64. -Difference between SU24, SU25 and SU22?
SU22 is used to maintain authorization defaults, SU24 is used to maintain authorization checks, and SU25 is used to maintain the upgrade of authorization objects.
SU22 is used to set default values for authorization fields
SU24 is used to maintain authorization checks for transactions and reports
SU25 is used to maintain the upgrade of authorization objects during system upgrades
All three transactions are used in SAP to manage authorizations and ensure system security
Q65. 1.Explain yourself? 2. What framework are you working on? 3. What are different types of waits?
I am an automation test engineer with experience in working on various frameworks and implementing different types of waits.
I have experience in working on frameworks like Selenium, Appium, TestNG, and JUnit.
I have implemented different types of waits like implicit wait, explicit wait, and fluent wait.
Implicit wait is used to wait for a certain amount of time before throwing an exception if the element is not found.
Explicit wait is used to wait for a certain condition to occu...read more
Q66. Explain Authentication & Authorization in asp.net core?
Authentication verifies the identity of a user, while authorization determines what resources a user can access.
Authentication confirms the identity of a user through credentials like username and password.
Authorization determines the permissions and access levels of a user based on their authenticated identity.
In ASP.NET Core, authentication is handled through middleware like Identity, OAuth, or JWT tokens.
Authorization in ASP.NET Core is managed through policies and roles d...read more
Q67. Which type is VPN using your client
Q68. What is Stack and Pre and post Tree formation
Stack is a data structure that follows LIFO. Pre and post tree formation are methods of traversing a tree.
Stack is used for backtracking, undoing, and recursion.
Pre-order traversal visits the root node first, then left subtree, then right subtree.
Post-order traversal visits the left subtree, then right subtree, then root node.
Q69. what do you know about cloud computing
Cloud computing is the delivery of computing services over the internet, including storage, servers, databases, networking, software, and analytics.
Cloud computing allows users to access and use resources on-demand without the need for physical infrastructure.
It offers scalability, flexibility, cost-effectiveness, and increased efficiency.
Examples of cloud computing services include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Q70. What are the troubleshooting steps if the Monitor is not working?
Troubleshooting steps for a non-working monitor
Check if the monitor is properly connected to the power source
Ensure the monitor's power button is turned on
Inspect the video cable connection between the monitor and the computer
Try using a different video cable or port
Restart the computer to see if the issue is resolved
Q71. If a user reports that SAP system is slow, what would you check?
I would check various components to identify the root cause of the slowness in the SAP system.
Check system resources such as CPU, memory, and disk usage
Review SAP performance logs and traces for any errors or bottlenecks
Monitor network connectivity between the user and the SAP system
Check for any recent changes or updates that may have impacted system performance
Q72. What is the main thing that you focused when compared to quality and quantity?
I prioritize quality over quantity as it leads to better outcomes and higher customer satisfaction.
Quality is essential for ensuring patient safety and positive health outcomes
Focusing on quality can lead to higher customer satisfaction and loyalty
Quantity may lead to burnout and decreased quality of care
Examples: spending more time with patients to ensure their needs are met, prioritizing thorough documentation to ensure accuracy and completeness
Q73. Do you know what is KYC? Do you know what is AML? Will you relocate? Will you flexible in rotational shifts?
KYC stands for Know Your Customer and AML stands for Anti-Money Laundering. Yes, I am willing to relocate and flexible in rotational shifts.
KYC is a process of verifying the identity of customers to prevent fraud and money laundering.
AML is a set of laws, regulations, and procedures to prevent criminals from disguising illegally obtained funds as legitimate income.
I am willing to relocate for the job if required.
I am flexible in working rotational shifts to meet the job requi...read more
Q74. 1. What are Derivatives 2. What is Reconciliation 3. How will you reconcile discrepancies
Derivatives are financial contracts that derive their value from an underlying asset. Reconciliation is the process of comparing two sets of records to ensure they are in agreement.
Derivatives are used to manage risk or speculate on price movements of an underlying asset
Reconciliation involves comparing two sets of records to identify and resolve discrepancies
Discrepancies can be reconciled by identifying the root cause and taking corrective action
Examples of derivatives incl...read more
Q75. What is Multi Factor Authentication?
Multi Factor Authentication is a security process that requires users to provide two or more forms of identification to access a system.
It adds an extra layer of security to prevent unauthorized access
Examples include using a password and a fingerprint scan or a security token and a PIN
It can be used for online banking, email, and other sensitive accounts
Q76. What is your current CTC and expected CTC?
My current CTC is $50,000 and I am expecting a 10% increase in my next role.
Current CTC: $50,000
Expected CTC: 10% increase
Open to negotiation based on job responsibilities and benefits
Q77. Can we perform DML operation on UDF function?
No, DML operations cannot be performed on UDF functions.
UDF functions are read-only and cannot modify the data in the database.
DML operations can only be performed on tables or views.
UDF functions can be used in SELECT statements to retrieve data.
Examples of UDF functions include string manipulation, date calculations, and mathematical operations.
Q78. How many years of experience do you have in Vmware?
I have 5 years of experience in Vmware.
I have worked with Vmware for 5 years in various roles.
I have experience in Vmware virtualization, networking, and storage.
I have implemented Vmware solutions for multiple clients.
I have completed Vmware certifications to enhance my skills.
Q79. Where are Logic App logs stored?
Logic App logs are stored in Azure Monitor Logs (formerly known as Log Analytics).
Logic App logs are stored in Azure Monitor Logs, which is a centralized log storage and analytics service in Azure.
Logs can be viewed and analyzed using Azure Monitor Logs queries.
Logs can also be integrated with other Azure services for monitoring and alerting purposes.
Q80. Select a.*,b.* From employee a,Employee2 b? Output please...
SQL query to select all columns from two tables.
Use SELECT statement to select columns from tables.
Use aliases to differentiate columns from different tables.
Separate table names with comma in FROM clause.
Q81. How the report got posted from concur to sap Types of payment structure Tcodes which is used for manul entry postings etc
The report is posted from Concur to SAP using Tcodes for manual entry postings.
Reports are exported from Concur in a format compatible with SAP
The Tcode FB01 is used for manual entry postings in SAP
Different payment structures can be set up in SAP depending on the organization's needs
Q82. What wete the mode if communication between devices in the product you worked.
The mode of communication between devices in the product I worked on was primarily through Bluetooth technology.
Bluetooth technology was used for wireless communication between devices
Devices were paired using Bluetooth to establish a connection
Data transfer and communication between devices were facilitated through Bluetooth
Examples: connecting a smartphone to a smartwatch, pairing a wireless keyboard with a computer
Q83. what is sticky bit and sgid?
Sticky bit and SGID are special permissions in Linux file system.
Sticky bit is denoted by 't' in file permission and restricts deletion of files in a directory by non-owners.
SGID is denoted by 's' in file permission and sets the group ID of newly created files to the group of the parent directory.
SGID can also be used on executable files to allow users to run them with the permissions of the group that owns the file.
SGID can be set on directories to ensure that newly created ...read more
Q84. TCD is based on what criteria?
TCD is based on the criteria of time, cost, and deliverables.
TCD stands for Time, Cost, and Deliverables.
It is a project management approach that focuses on these three criteria.
The goal is to complete the project within the given time and budget while delivering the desired results.
For example, if a software development project is using TCD, the team will prioritize tasks based on their impact on time, cost, and deliverables.
This approach helps to ensure that the project sta...read more
Q85. Debug the following code: var a=10; function abc() { console.log(a); var a=2; } abc();
The code will output 'undefined' because variable 'a' is hoisted within the function.
Variable 'a' is hoisted to the top of the function scope, so when 'console.log(a)' is called, 'a' is undefined.
To fix this, move the declaration of 'var a=2;' above the 'console.log(a);' statement.
Q86. What is the SP3 Architecture of Palo Alto Firewalls?
SP3 Architecture of Palo Alto Firewalls refers to Security Processing Plane, Control Plane, and Data Plane.
SP3 Architecture consists of Security Processing Plane (SP), Control Plane (C), and Data Plane (D)
Security Processing Plane (SP) handles security functions like threat prevention and decryption
Control Plane (C) manages routing and firewall policies
Data Plane (D) processes and forwards traffic based on firewall policies
SP3 Architecture helps in efficient and effective net...read more
Q87. How to break a page based on condition?
Use the command 'NEW-PAGE' to break a page based on condition in SAP ABAP.
Use the command 'NEW-PAGE' followed by a condition to break a page in SAP ABAP.
Example: NEW-PAGE TITLE 'New Page Title'.
Example: NEW-PAGE TITLE 'New Page Title' AT LINE-SELECTION.
Q88. how do you review your code before sharing with Peer Review.
I review my code by conducting thorough testing, following coding standards, and using code analysis tools.
Conduct thorough testing to identify and fix any bugs or issues.
Follow coding standards to ensure consistency and readability.
Use code analysis tools to check for potential errors or inefficiencies.
Seek feedback from colleagues or mentors for additional insights.
Q89. What is Active Directory
Active Directory is a directory service that stores information about network resources and enables centralized management.
Active Directory is a Microsoft technology used in Windows-based networks.
It provides a centralized database for managing users, computers, and other network resources.
Active Directory uses a hierarchical structure with domains, trees, and forests.
It allows for authentication, authorization, and access control to network resources.
Active Directory enables...read more
Q90. What problems do you see in Indian banks that can be technically addresses.
Indian banks face several technical problems that need to be addressed.
Outdated technology infrastructure
Inadequate cybersecurity measures
Lack of interoperability between different banking systems
Inefficient data management and analytics
Limited adoption of digital banking solutions
Inadequate customer support and grievance redressal mechanisms
Q91. What are different types of api methods have you used and where
I have used various types of API methods including GET, POST, PUT, and DELETE.
GET method is used to retrieve data from a server. For example, I have used GET method to fetch user information from a user API endpoint.
POST method is used to send data to a server to create a new resource. I have used POST method to create new records in a database through API calls.
PUT method is used to update existing data on a server. For instance, I have used PUT method to update user informa...read more
Q92. Explain session management in asp.net core?
Session management in ASP.NET Core involves storing and retrieving user-specific data during a user's visit to a website.
Session data is stored on the server side by default in ASP.NET Core
Session data can be accessed and manipulated using the HttpContext.Session property
Session data can be configured to use different storage providers such as in-memory, distributed cache, or SQL Server
Session data is typically used to store user-specific information like user ID, shopping ca...read more
Q93. Design a react app to fetch and display data from an api.
Design a React app to fetch and display data from an API.
Create a React component to fetch data from the API using fetch or axios
Use state to store the fetched data and update the component's UI
Render the data in the component's JSX to display it on the screen
Q94. Explain how you plan the Test Cycle Schedule?
Test cycle schedule is planned by considering project timelines, test objectives, resources, and risks.
Identify project timelines and milestones
Define test objectives and scope
Allocate resources and identify dependencies
Identify and prioritize risks
Create a detailed test plan and schedule
Review and adjust the schedule as needed
Q95. Can we call future method from batch class
Yes, future methods can be called from a batch class in Salesforce.
Future methods can be called from batch classes to perform asynchronous processing.
This can be useful for offloading long-running tasks to future methods to avoid hitting governor limits.
Example: Calling a future method from a batch class to update records in Salesforce asynchronously.
Q96. What is the relation temperature, current and resistance?
Temperature affects resistance, which in turn affects current flow in a circuit.
As temperature increases, resistance typically increases as well.
Higher resistance leads to lower current flow in a circuit.
Conversely, lower resistance results in higher current flow.
Ohm's Law (V = I * R) describes the relationship between current, voltage, and resistance in a circuit.
Q97. Describe OOP's concepts Difference between throw and throws compile time and runtime polymorphism static methods Exception Handling Program to find occurrences of characters in a string
OOP's concepts include encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Inheritance: Allowing a class to inherit properties and behavior from another class.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation details and showing only the necessary features.
Q98. What is EiGRP variance, route inflence EIGRP, Route Reflector
EIGRP variance is used to load balance traffic across unequal cost paths. Route influence EIGRP is used to manipulate the metric of a route. Route Reflector is used in BGP to reduce the number of iBGP peerings.
EIGRP variance is used to balance traffic across multiple paths with different costs
Route influence EIGRP is used to manipulate the metric of a route to influence the path selection
Route Reflector is used in BGP to reduce the number of iBGP peerings by reflecting routes...read more
Q99. Return type of patial view and render partial view?
Partial view returns HTML string while render partial view writes directly to response stream.
Partial view returns HTML string that can be used in the main view
Render partial view writes directly to response stream
Partial view can be used to render reusable components
Render partial view can be used to render a partial view without a layout
Q100. What do you know about NTT Data?
NTT Data is a global IT services company providing consulting, application services, and infrastructure services.
NTT Data is a subsidiary of Nippon Telegraph and Telephone Corporation, a Japanese telecommunications company.
It offers a wide range of services including consulting, application development, and infrastructure management.
NTT Data has a presence in over 50 countries and serves clients in various industries such as healthcare, finance, and manufacturing.
The company ...read more
Top HR Questions asked in null
Interview Process at null
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month