Add office photos
Premium Employer

NTT Data Information Processing Services

4.0
based on 2.7k Reviews
Filter interviews by

40+ Crayon Software Experts India Interview Questions and Answers

Updated 9 Jan 2025

Q1. On an average, how many invoices can you process in a day?

Ans.

I can process around 50-60 invoices per day depending on the complexity.

  • The number of invoices processed can vary based on the complexity of the invoices.

  • I have experience in using various invoice processing software which helps in increasing the efficiency.

  • I prioritize the invoices based on their due dates and ensure timely processing.

View 9 more answers

Q2. What is the KPI in your organisation?

Ans.

The KPI in our organization is customer satisfaction.

  • Customer satisfaction is measured through surveys and feedback.

  • We track the percentage of satisfied customers on a monthly basis.

  • We also monitor the number of customer complaints and aim to reduce them.

  • Improving customer satisfaction is a key focus for our team.

View 3 more answers

Q3. What is the difference between SLA and TAT?

Ans.

SLA stands for Service Level Agreement, while TAT stands for Turnaround Time.

  • SLA is a contractual agreement between a service provider and a customer, defining the level of service expected.

  • TAT refers to the time taken to complete a specific task or process.

  • SLA focuses on the quality and availability of services, while TAT focuses on the speed of completing tasks.

  • SLA is usually measured in terms of percentage uptime or response time, while TAT is measured in hours, minutes, o...read more

View 3 more answers

Q4. What is the TAT for processing an invoice?

Ans.

The TAT for processing an invoice varies depending on the complexity of the invoice and the company's internal processes.

  • The TAT can range from a few days to several weeks.

  • Factors that can affect the TAT include the accuracy of the invoice, the approval process, and the payment terms.

  • Automating the invoice processing system can help reduce the TAT and improve efficiency.

  • Regularly reviewing and optimizing the invoice processing system can also help reduce the TAT.

  • It is importa...read more

View 5 more answers
Discover Crayon Software Experts India interview dos and don'ts from real experiences

Q5. Select columnname as 1 from employee table,Output if employee table contain 100 record?

Ans.

The question is asking to select a column named 'columnname' as '1' from the employee table and provide the output if the table contains 100 records.

  • The column 'columnname' does not exist in the employee table, so the query will result in an error.

  • The value '1' will be selected for each record in the employee table, resulting in 100 rows with the value '1'.

  • The output will be a single column with 100 rows, all containing the value '1'.

View 1 answer

Q6. Performance of virtual machine ( from VC, ESXtop), critical issue faced, Dvswitch/standard switch difference, Network security/teaming policy, full scenario for PSC, Virtual center upgrade and what ever you men...

read more
Ans.

The question covers various aspects of virtual machine performance, network security, and upgrades.

  • Virtual machine performance can be monitored using tools like VC and ESXtop.

  • Critical issues faced can include resource contention, network congestion, and storage latency.

  • Dvswitch and standard switch have differences in terms of features and capabilities.

  • Network security can be ensured through policies like teaming and VLANs.

  • PSC and Virtual Center upgrades require careful planni...read more

Add your answer
Are these interview questions helpful?

Q7. What is service management? How do you handle escalations and difficult customers? What is a Service Level Agreement (SLA), and what are the different types of SLAs? Current job responsibilities and deliverable...

read more
Ans.

Service management involves handling customer escalations, ensuring SLAs are met, and delivering high-quality service.

  • Service management involves overseeing the delivery of services to customers, ensuring their needs are met and issues are resolved efficiently.

  • Handling escalations involves addressing customer complaints or issues that have not been resolved through regular channels, and finding solutions to satisfy the customer.

  • Dealing with difficult customers requires patien...read more

Add your answer

Q8. How to identify the cost of ospf ? What are the bgp attributes? How stp works

Ans.

Identifying OSPF cost, BGP attributes, and STP working

  • OSPF cost is calculated based on the bandwidth of the link

  • BGP attributes include AS path, next hop, local preference, etc.

  • STP works by selecting a root bridge and blocking redundant paths

  • OSPF cost can be manually configured using the 'ip ospf cost' command

  • BGP attributes are used to determine the best path for routing

  • STP uses BPDU messages to exchange information and build a loop-free topology

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Draft email to the customer for delay in Service Delivery

Ans.

Draft email to customer for delay in service delivery

  • Apologize for the delay and explain the reason

  • Provide a new estimated delivery date

  • Offer compensation or discount for the inconvenience caused

  • Assure the customer that steps are being taken to avoid such delays in future

  • End the email with a positive note and thank the customer for their patience

Add your answer

Q10. What checks did you perform any network device down ?

Ans.

I perform various checks to identify the cause of network device down.

  • Check if the device is powered on and connected to the network

  • Ping the device to see if it responds

  • Check the device logs for any errors or warnings

  • Check the network switch to see if the port is active

  • Check if there are any network outages or maintenance scheduled

  • Contact the device owner or vendor for further assistance

Add your answer

Q11. Can we perform DML operation on UDF function?

Ans.

No, DML operations cannot be performed on UDF functions.

  • UDF functions are read-only and cannot modify the data in the database.

  • DML operations can only be performed on tables or views.

  • UDF functions can be used in SELECT statements to retrieve data.

  • Examples of UDF functions include string manipulation, date calculations, and mathematical operations.

Add your answer

Q12. Select a.*,b.* From employee a,Employee2 b? Output please...

Ans.

SQL query to select all columns from two tables.

  • Use SELECT statement to select columns from tables.

  • Use aliases to differentiate columns from different tables.

  • Separate table names with comma in FROM clause.

Add your answer

Q13. Return type of patial view and render partial view?

Ans.

Partial view returns HTML string while render partial view writes directly to response stream.

  • Partial view returns HTML string that can be used in the main view

  • Render partial view writes directly to response stream

  • Partial view can be used to render reusable components

  • Render partial view can be used to render a partial view without a layout

Add your answer

Q14. 1. What are Derivatives 2. What is Reconciliation 3. How will you reconcile discrepancies

Ans.

Derivatives are financial contracts that derive their value from an underlying asset. Reconciliation is the process of comparing two sets of records to ensure they are in agreement.

  • Derivatives are used to manage risk or speculate on price movements of an underlying asset

  • Reconciliation involves comparing two sets of records to identify and resolve discrepancies

  • Discrepancies can be reconciled by identifying the root cause and taking corrective action

  • Examples of derivatives incl...read more

Add your answer

Q15. Network call flows and interfaces in 2G,3G4G and IMS

Ans.

Understanding network call flows and interfaces is crucial for testing 2G, 3G, 4G, and IMS technologies.

  • 2G call flow involves circuit-switched technology and uses GSM architecture

  • 3G call flow involves packet-switched technology and uses UMTS architecture

  • 4G call flow involves all-IP technology and uses LTE architecture

  • IMS call flow involves VoIP technology and uses SIP protocol

  • Interfaces include RAN, Core Network, and IMS

  • Testing involves verifying call setup, handovers, and da...read more

Add your answer

Q16. What are strength and weakness?

Ans.

Strengths are positive attributes that contribute to success, while weaknesses are areas that need improvement.

  • Strengths: leadership skills, attention to detail, problem-solving abilities

  • Weaknesses: public speaking, time management, delegation

  • Examples: Strength - ability to motivate team members; Weakness - tendency to procrastinate

View 1 answer

Q17. Project management life cycle What is admin account in AD What is OU

Ans.

Admin account in AD is a privileged account with full control over Active Directory. OU stands for Organizational Unit, a container object in AD.

  • Admin account has full control over AD objects and can perform any action on them

  • OU is a container object used to organize and manage AD objects

  • OU can be used to delegate administrative control over specific objects to non-administrative users

  • Example: Sales OU can contain all user accounts and resources related to the sales departmen...read more

Add your answer

Q18. Diff b/w Virtual and new keyword?

Ans.

Virtual keyword is used for method overriding while new keyword is used for hiding base class member.

  • Virtual keyword is used to allow a derived class to override a method in the base class.

  • New keyword is used to hide a base class member in the derived class.

  • Virtual keyword is used with the base class method while new keyword is used with the derived class method.

  • Virtual keyword is used for runtime polymorphism while new keyword is used for compile-time polymorphism.

Add your answer

Q19. What is method hiding?

Ans.

Method hiding is a technique in object-oriented programming where a subclass provides a method with the same name as a method in its superclass.

  • Method hiding is also known as static polymorphism or compile-time polymorphism.

  • It allows a subclass to provide its own implementation of a method without affecting the superclass's implementation.

  • The method in the subclass must have the same name and signature as the method in the superclass.

  • Method hiding is achieved by using the 'ne...read more

Add your answer

Q20. What do you know about NTT Data

Ans.

NTT Data is a global IT services company providing consulting, application services, and business process outsourcing.

  • NTT Data is a subsidiary of Nippon Telegraph and Telephone Corporation, a Japanese telecommunications company.

  • They offer a wide range of services including consulting, application development, and business process outsourcing.

  • NTT Data has a global presence with offices in over 50 countries.

  • They have expertise in various industries such as healthcare, finance, ...read more

Add your answer

Q21. What are the bgp state's?

Ans.

BGP states are the different stages a BGP session goes through during establishment and maintenance.

  • BGP Idle state

  • BGP Connect state

  • BGP Active state

  • BGP OpenSent state

  • BGP OpenConfirm state

  • BGP Established state

Add your answer

Q22. Difference between Problem and Incident

Ans.

Problem is the underlying cause of one or more incidents, while an incident is an event that disrupts normal service operation.

  • A problem is a root cause of one or more incidents, while an incident is a disruption of normal service operation.

  • Problems are identified through multiple incidents, while incidents are reported as soon as they occur.

  • Problems require investigation and resolution, while incidents require immediate action to restore service.

  • Examples of problems include ...read more

Add your answer

Q23. Diff between shared mail box and distribution list

Ans.

Shared mailbox is used for multiple users to access and manage emails, while distribution list is used to send emails to a group of recipients.

  • Shared mailbox allows multiple users to access and manage emails in a single mailbox.

  • Distribution list is used to send emails to a group of recipients by using a single email address.

  • Shared mailbox is typically used for collaboration within a team or department.

  • Distribution list is commonly used for sending announcements or updates to ...read more

Add your answer

Q24. write a flowchart for a given problem statement

Ans.

Flowchart for a given problem statement

  • Start with the beginning of the process

  • Define decision points and actions

  • Use appropriate symbols for processes, decisions, and terminators

  • Connect the symbols with arrows to show the flow of the process

  • Include loops or repetitions if necessary

Add your answer

Q25. What are account type s on fico?

Ans.

Account types in FICO include asset accounts, liability accounts, equity accounts, revenue accounts, and expense accounts.

  • Asset accounts represent resources owned by the company, such as cash, inventory, and equipment.

  • Liability accounts represent obligations owed by the company, such as loans and accounts payable.

  • Equity accounts represent the owner's stake in the company.

  • Revenue accounts track income generated by the company, such as sales revenue.

  • Expense accounts track costs...read more

Add your answer

Q26. Explanation (to customer) for missed SLA

Ans.

The explanation should include the reason for the delay and steps taken to prevent it in the future.

  • Acknowledge the missed SLA and apologize for the inconvenience caused to the customer.

  • Explain the reason for the delay, whether it was due to unforeseen circumstances or internal issues.

  • Provide assurance that steps have been taken to prevent such delays in the future.

  • Offer a solution or compensation to the customer if possible.

  • Thank the customer for their patience and understan...read more

Add your answer

Q27. What are production management?

Ans.

Production management involves planning, organizing, directing, and controlling the production process to ensure efficient and effective operations.

  • Planning and scheduling production activities

  • Managing resources such as labor, materials, and equipment

  • Ensuring quality control and meeting production targets

  • Implementing and improving production processes

  • Managing budgets and costs

  • Coordinating with other departments such as sales and marketing

  • Ensuring compliance with safety and en...read more

Add your answer

Q28. Why bgp used, state, LP and weight, med

Ans.

BGP is used for routing between autonomous systems. LP and weight are used for path selection. MED is used for path advertisement.

  • BGP is used for inter-domain routing between autonomous systems.

  • LP (Local Preference) is used to select the preferred path among multiple paths within the same AS.

  • Weight is a Cisco proprietary parameter used to select the preferred path among multiple paths within the same AS.

  • MED (Multi-Exit Discriminator) is used to influence the path selection in...read more

Add your answer

Q29. Quick troubleshooting for admins like SCCM, AD and Azure

Ans.

Quick troubleshooting tips for SCCM, AD, and Azure

  • Check event logs for errors or warnings

  • Verify network connectivity

  • Restart services related to the issue

  • Check permissions and group memberships

  • Review SCCM logs for client issues

  • Use Azure Resource Health for Azure service status

  • Check AD replication status

Add your answer

Q30. Why are joining NTT DATA?

Ans.

NTT DATA is a leading global IT services provider with a strong focus on innovation and customer satisfaction.

  • I am joining NTT DATA because of their reputation as a top IT services provider

  • I am excited about the opportunity to work with a company that values innovation and customer satisfaction

  • NTT DATA's commitment to diversity and inclusion aligns with my personal values

  • I am impressed with NTT DATA's global presence and the opportunity to work on projects with a global impac...read more

Add your answer

Q31. What are service value system?

Ans.

A service value system is a framework that defines the values, principles, and practices that guide an organization in delivering value to its customers.

  • Defines the values, principles, and practices of an organization

  • Guides the organization in delivering value to customers

  • Helps in aligning the organization's goals with customer needs

Add your answer

Q32. What is VPN

Ans.

A VPN, or Virtual Private Network, is a secure connection that allows users to access the internet privately and securely.

  • Creates a secure encrypted connection over a less secure network, such as the internet

  • Helps protect sensitive data and online privacy

  • Allows users to access restricted websites or content

  • Commonly used by remote workers to securely connect to their company's network

Add your answer

Q33. Complexity of the algorithm

Ans.

Complexity of an algorithm refers to the amount of resources required to execute it.

  • Complexity can be measured in terms of time and space complexity.

  • Time complexity refers to the number of operations required to execute the algorithm.

  • Space complexity refers to the amount of memory required to execute the algorithm.

  • Common time complexities include O(1), O(log n), O(n), O(n log n), O(n^2), O(2^n), O(n!).

  • Optimizing algorithms for lower complexity can improve performance and scal...read more

Add your answer

Q34. Data Migration in Teamcenter platform.

Ans.

Data migration in Teamcenter platform involves transferring data from one system to another while ensuring data integrity and accuracy.

  • Understand the data structure and relationships in the current system

  • Plan the migration process including data extraction, transformation, and loading

  • Perform data validation and testing to ensure successful migration

  • Consider data security and compliance during the migration process

  • Utilize tools and scripts for efficient data migration

  • Examples:...read more

Add your answer

Q35. What is cyber kill chain

Ans.

Cyber kill chain is a framework used to describe the stages of a cyber attack from initial reconnaissance to data exfiltration.

  • Cyber kill chain consists of several stages including reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.

  • Each stage represents a step in the attacker's process of infiltrating a target network and achieving their goals.

  • Understanding the cyber kill chain can help organizations identify an...read more

Add your answer

Q36. What is defect life cycle

Ans.

Defect life cycle is the process of identifying, reporting, prioritizing, fixing, and verifying defects in software development.

  • Defect is identified by testers during testing

  • Defect is reported to the development team

  • Development team prioritizes and fixes the defect

  • Fixed defect is verified by testers

  • Defect is closed if it passes verification or reopened if it fails

Add your answer

Q37. Various types of insurance

Ans.

Various types of insurance include health, life, auto, home, and disability insurance.

  • Health insurance covers medical expenses and treatments.

  • Life insurance provides financial protection to beneficiaries in case of the insured's death.

  • Auto insurance covers damages and liabilities related to vehicles.

  • Home insurance protects against damages to the home and belongings.

  • Disability insurance provides income replacement if the insured is unable to work due to a disability.

Add your answer

Q38. reason for choosing NTT Data

Ans.

Chose NTT Data for its reputation, global presence, and opportunities for growth.

  • Reputation for providing innovative solutions in IT services

  • Global presence with offices in multiple countries

  • Opportunities for career growth and development

  • Positive reviews from current employees

Add your answer

Q39. Current CTC EXPECTED CTC,

Ans.

Current CTC is confidential, Expected CTC is negotiable based on role and responsibilities.

  • Current CTC is confidential information and not disclosed during interviews.

  • Expected CTC is based on the seniority of the role, responsibilities, market standards, and negotiation.

  • I am open to discussing the expected CTC based on the specifics of the role and benefits package.

Add your answer

Q40. Last drawn ctc of the company

Ans.

I am currently earning a salary of $60,000 per year at my current company.

  • My last drawn CTC at my current company is $60,000 per year

  • I am currently earning $5,000 per month at my current job

Add your answer

Q41. What is CIA .

Ans.

CIA stands for Confidentiality, Integrity, and Availability, which are the three core principles of information security.

  • Confidentiality: Ensuring that information is only accessible to those who are authorized to view it.

  • Integrity: Ensuring that information is accurate and has not been tampered with.

  • Availability: Ensuring that information is accessible when needed by authorized users.

  • Example: Encrypting sensitive data to maintain confidentiality.

  • Example: Implementing checksu...read more

Add your answer

Q42. What is big data ?

Add your answer

Q43. Explain p2p process?

Ans.

P2P process stands for Procure to Pay process, which involves all steps from requisitioning goods/services to making payment.

  • Requisitioning: Requesting goods/services needed by the organization.

  • Vendor selection: Choosing a vendor to fulfill the requisition.

  • Purchase order creation: Formalizing the agreement with the vendor.

  • Goods receipt: Receiving the goods/services from the vendor.

  • Invoice verification: Checking the invoice against the purchase order and goods receipt.

  • Payment ...read more

Add your answer

Q44. Justify position

Ans.

Senior System Administrator position requires advanced technical skills and experience in managing complex IT systems.

  • Extensive experience in managing and troubleshooting complex IT systems

  • Advanced knowledge of network infrastructure and security protocols

  • Proven track record of implementing and maintaining system backups and disaster recovery plans

  • Strong communication and problem-solving skills

  • Ability to work well under pressure and prioritize tasks effectively

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Crayon Software Experts India

based on 27 interviews in the last 1 year
Interview experience
4.6
Excellent
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.0
 • 831 Interview Questions
4.0
 • 535 Interview Questions
3.9
 • 205 Interview Questions
4.0
 • 173 Interview Questions
4.0
 • 162 Interview Questions
4.7
 • 145 Interview Questions
View all
Top NTT Data Information Processing Services Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter