Add office photos
Premium Employer

NTT Data Information Processing Services

4.0
based on 6.5k Reviews
Filter interviews by

300+ Interview Questions and Answers

Updated 11 Dec 2024
Popular Designations

Q1. On an average, how many invoices can you process in a day?

Ans.

I can process around 50-60 invoices per day depending on the complexity.

  • The number of invoices processed can vary based on the complexity of the invoices.

  • I have experience in using various invoice processing software which helps in increasing the efficiency.

  • I prioritize the invoices based on their due dates and ensure timely processing.

View 9 more answers

Q2. What is ost and pst in Outlook, what is distribution list and mailbox, how to create new data file in Outlook, how to fix bsod issue in windows OS, what is bios and key to enter in bios, what is office 365, dif...

read more
Ans.

Questions related to Outlook, Windows OS, and Office 365.

  • OST and PST are file formats used by Outlook to store data.

  • Distribution list is a group of email addresses used for sending emails to multiple recipients.

  • Mailbox is a storage location for emails and other data in Outlook.

  • To create a new data file in Outlook, go to File > New > Outlook Data File.

  • BSOD issue in Windows OS can be fixed by updating drivers or running system diagnostics.

  • BIOS is a firmware that initializes har...read more

View 2 more answers

Q3. What is the KPI in your organisation?

Ans.

The KPI in our organization is customer satisfaction.

  • Customer satisfaction is measured through surveys and feedback.

  • We track the percentage of satisfied customers on a monthly basis.

  • We also monitor the number of customer complaints and aim to reduce them.

  • Improving customer satisfaction is a key focus for our team.

View 3 more answers

Q4. What is the difference between SLA and TAT?

Ans.

SLA stands for Service Level Agreement, while TAT stands for Turnaround Time.

  • SLA is a contractual agreement between a service provider and a customer, defining the level of service expected.

  • TAT refers to the time taken to complete a specific task or process.

  • SLA focuses on the quality and availability of services, while TAT focuses on the speed of completing tasks.

  • SLA is usually measured in terms of percentage uptime or response time, while TAT is measured in hours, minutes, o...read more

View 3 more answers
Discover null interview dos and don'ts from real experiences

Q5. if I give you a box full of pencils..in how many ways can you use it

Ans.

There are numerous ways to use a box full of pencils depending on the context and purpose.

  • Pencils can be used for writing, drawing, sketching, coloring, shading, and more.

  • They can be used for artistic purposes, schoolwork, office work, or personal use.

  • Pencils can also be used as a tool for measurement, as a makeshift stylus, or even as a musical instrument.

  • The number of ways to use a box full of pencils is virtually limitless and depends on the creativity and imagination of t...read more

View 1 answer

Q6. What is the TAT for processing an invoice?

Ans.

The TAT for processing an invoice varies depending on the complexity of the invoice and the company's internal processes.

  • The TAT can range from a few days to several weeks.

  • Factors that can affect the TAT include the accuracy of the invoice, the approval process, and the payment terms.

  • Automating the invoice processing system can help reduce the TAT and improve efficiency.

  • Regularly reviewing and optimizing the invoice processing system can also help reduce the TAT.

  • It is importa...read more

View 5 more answers
Are these interview questions helpful?

Q7. -Tell me about MSMP workflow and what is the usage of BRF+ application?

Ans.

MSMP workflow is a tool for defining and executing approval processes in SAP systems. BRF+ is an application used to create business rules.

  • MSMP workflow is used to define and execute approval processes for various business scenarios in SAP systems.

  • It allows for the creation of complex approval workflows with multiple levels of approval and parallel processing.

  • BRF+ is an application used to create business rules that can be used in MSMP workflows.

  • These rules can be used to det...read more

Add your answer

Q8. What are the different types of Database management systems. What are the Database languages ? What is the difference between drop, delete and truncate?

Ans.

Different types of DBMS, DB languages & difference between drop, delete & truncate.

  • Types of DBMS: Relational, NoSQL, Object-oriented, Hierarchical, Network, etc.

  • Database languages: SQL, PL/SQL, T-SQL, etc.

  • DROP: Deletes a table and its data, cannot be rolled back.

  • DELETE: Deletes rows from a table, can be rolled back.

  • TRUNCATE: Deletes all rows from a table, cannot be rolled back.

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Explain me Raid? how many raid are there? which raid is best to use?

Ans.

RAID stands for Redundant Array of Independent Disks. It is a data storage technology that combines multiple physical disks into a single logical unit.

  • There are several types of RAID, including RAID 0, RAID 1, RAID 5, RAID 6, RAID 10, and more.

  • RAID 0 offers no redundancy but provides improved performance by striping data across multiple disks.

  • RAID 1 provides mirroring of data across two disks, offering redundancy but no performance improvement.

  • RAID 5 uses striping with parity...read more

View 3 more answers

Q10. -Unable to submit a GRC ARM request? How do you troubleshoot?

Ans.

To troubleshoot GRC ARM request submission issue, follow these steps:

  • Check if the user has the necessary authorization to submit the request

  • Verify if the request is complete and all mandatory fields are filled

  • Check if there are any system errors or connectivity issues

  • Review the GRC logs to identify any errors or warnings

  • If the issue persists, escalate to the GRC support team for further investigation

Add your answer

Q11. -Custom Tcodes and how do get risk analysis for custom tcodes?

Ans.

Risk analysis for custom tcodes can be done using SAP GRC Access Control.

  • Create custom roles and assign tcodes to them

  • Run risk analysis using SAP GRC Access Control

  • Analyze the results and mitigate any identified risks

  • Regularly review and update custom roles and tcodes

  • Consider using SAP GRC Access Control's continuous compliance monitoring feature

Add your answer

Q12. PP production process flow Co product By product Difference In Bom how to create Bill of material of non stock items Important views of material master What is master data T code for demand management Productio...

read more
Ans.

Questions related to SAP PP Consultant role including production process flow, BOM creation, material master views, demand management, production execution, and MRP run differences.

  • PP production process flow involves planning, execution, and monitoring of production processes.

  • Co-product and by-product are two types of secondary products produced during the main production process.

  • Non-stock items can be included in BOM by creating a phantom item or using a material type that a...read more

Add your answer

Q13. How to raise the ticket , which type of ticket portal you are using

Add your answer

Q14. What is outlook? Explain some basic feature and how to open this in safe mode?

Ans.

Outlook is a personal information manager from Microsoft. It is used for email, calendar, task management, and contacts.

  • Outlook is used for email communication, scheduling appointments, managing tasks, and storing contacts.

  • It has a user-friendly interface with customizable features.

  • Outlook can be opened in safe mode by holding down the CTRL key while clicking on the Outlook icon.

  • Safe mode is useful for troubleshooting issues with Outlook, as it disables any add-ins or customi...read more

Add your answer

Q15. Powerbuilder 1.What is lookupdisplay function and when do we use datawindow 2.how do you debug and track errors in powerbuilder 3. Difference between quick select and Sql select data source 4.how to connect wit...

read more
Ans.

Answers to questions related to Powerbuilder for Senior Software Developer position.

  • lookupdisplay function is used to display a value from a related table in a datawindow

  • Debugging and error tracking can be done using the Powerbuilder debugger and log files

  • Quick select is used for simple queries while SQL select data source is used for complex queries

  • Powerbuilder can connect to different databases using ODBC or native drivers

  • Commit or rollback can be done in triggers using SQL...read more

Add your answer

Q16. Give a real time example of Inheritance, Polymorphism, Abstraction and Encapsulation.

Ans.

Real-time examples of OOP concepts

  • Inheritance: A car is a vehicle, inheriting properties of a vehicle

  • Polymorphism: A shape can be a square or a circle, both implementing the same area method

  • Abstraction: A TV remote has buttons to perform actions, but the user doesn't need to know how it works internally

  • Encapsulation: A bank account has private data like balance, which can only be accessed through public methods

Add your answer

Q17. Performance of virtual machine ( from VC, ESXtop), critical issue faced, Dvswitch/standard switch difference, Network security/teaming policy, full scenario for PSC, Virtual center upgrade and what ever you men...

read more
Ans.

The question covers various aspects of virtual machine performance, network security, and upgrades.

  • Virtual machine performance can be monitored using tools like VC and ESXtop.

  • Critical issues faced can include resource contention, network congestion, and storage latency.

  • Dvswitch and standard switch have differences in terms of features and capabilities.

  • Network security can be ensured through policies like teaming and VLANs.

  • PSC and Virtual Center upgrades require careful planni...read more

Add your answer

Q18. A scrum master in Agile is equivalent to which position in water fall?

Ans.

Scrum Master in Agile is equivalent to Project Manager in Waterfall.

  • Scrum Master is responsible for facilitating the Agile process and ensuring the team follows it.

  • Project Manager is responsible for managing the project from start to finish in Waterfall.

  • Both roles involve managing the team and ensuring the project is completed on time and within budget.

  • However, the approach and methodology used are different in Agile and Waterfall.

Add your answer

Q19. Write a SQL query to to print all the rows in a table that has no match in a second table.

Ans.

SQL query to print rows with no match in a second table

  • Use LEFT JOIN to join the two tables

  • Filter the rows where the second table's primary key is NULL

  • SELECT the columns from the first table

Add your answer

Q20. What is service management? How do you handle escalations and difficult customers? What is a Service Level Agreement (SLA), and what are the different types of SLAs? Current job responsibilities and deliverable...

read more
Ans.

Service management involves handling customer escalations, ensuring SLAs are met, and delivering high-quality service.

  • Service management involves overseeing the delivery of services to customers, ensuring their needs are met and issues are resolved efficiently.

  • Handling escalations involves addressing customer complaints or issues that have not been resolved through regular channels, and finding solutions to satisfy the customer.

  • Dealing with difficult customers requires patien...read more

Add your answer

Q21. What is the formula of simple interest?

Ans.

The formula for simple interest is I = P * R * T

  • Simple interest is calculated using the formula I = P * R * T

  • I represents the interest amount, P is the principal amount, R is the rate of interest, and T is the time period

  • For example, if the principal amount is $1000, the rate of interest is 5%, and the time period is 2 years, the simple interest would be $100

View 13 more answers

Q22. Which type of email client is using in your company

Add your answer

Q23. -Difference between Centralized and Decentralized EAM system? Which is preferable?

Ans.

Centralized EAM system has a single database while Decentralized EAM system has multiple databases.

  • Centralized EAM system is easier to manage and maintain.

  • Decentralized EAM system provides more flexibility and autonomy to individual departments.

  • Preference depends on the organization's size, structure, and requirements.

Add your answer

Q24. What is the difference between final, finally and finalise?

Ans.

Final, finally and finalise are related to completion or conclusion, but have different meanings and usage.

  • Final is an adjective used to describe the last or ultimate stage of something.

  • Finally is an adverb used to indicate the end of a process or event after a long wait or delay.

  • Finalise is a verb used to complete or finish something, often with a formal or official process.

  • Examples: The final exam, finally finished the project, finalise the contract.

Add your answer

Q25. What is the formula of (a+b)2?

Ans.

The formula of (a+b)2 is a^2 + 2ab + b^2.

  • The formula is derived using the distributive property of multiplication over addition.

  • It can also be expanded as (a+b)(a+b) or a(a+b) + b(a+b).

  • The result is a quadratic expression with three terms.

View 12 more answers

Q26. What if product owner adds a user story in the middle of the sprint ?

Ans.

It is not recommended to add user stories in the middle of the sprint.

  • Product owner should be advised to wait until the next sprint planning meeting to add the user story.

  • If the user story is critical, the team should discuss and decide if it can be accommodated within the current sprint.

  • Adding user stories in the middle of the sprint can disrupt the team's focus and impact the sprint goal.

  • The Scrum Master should facilitate a discussion with the team and product owner to dete...read more

Add your answer

Q27. How to identify the cost of ospf ? What are the bgp attributes? How stp works

Ans.

Identifying OSPF cost, BGP attributes, and STP working

  • OSPF cost is calculated based on the bandwidth of the link

  • BGP attributes include AS path, next hop, local preference, etc.

  • STP works by selecting a root bridge and blocking redundant paths

  • OSPF cost can be manually configured using the 'ip ospf cost' command

  • BGP attributes are used to determine the best path for routing

  • STP uses BPDU messages to exchange information and build a loop-free topology

Add your answer

Q28. Select columnname as 1 from employee table,Output if employee table contain 100 record?

Ans.

The question is asking to select a column named 'columnname' as '1' from the employee table and provide the output if the table contains 100 records.

  • The column 'columnname' does not exist in the employee table, so the query will result in an error.

  • The value '1' will be selected for each record in the employee table, resulting in 100 rows with the value '1'.

  • The output will be a single column with 100 rows, all containing the value '1'.

View 1 answer

Q29. write the idea or algorithm for d program of fibonacci series

Ans.

Fibonacci series is a sequence of numbers where each number is the sum of the two preceding ones.

  • Start with 0 and 1 as the first two numbers

  • Add the previous two numbers to get the next number

  • Repeat until desired number of terms

Add your answer

Q30. What is jvm,jdk,jre Finall, finally, finalize key words String, string builder, string buffer, Code output Difference between hash map,hast set Advantages of array list and linked list And program Oops concepts...

read more
Ans.

Java Developer interview questions covering JVM, keywords, data structures, OOPs concepts, and Java features.

  • JVM is Java Virtual Machine that executes Java bytecode

  • JDK is Java Development Kit that includes JRE and development tools

  • JRE is Java Runtime Environment that provides runtime environment for Java programs

  • finally block is used to execute code after try-catch block

  • finalize method is called by garbage collector before object is destroyed

  • String is immutable, StringBuilder...read more

Add your answer

Q31. When does APEX CPU Limit Exceeded error happens. What's the best practice to avoid getting this error?

Ans.

APEX CPU Limit Exceeded error happens when code consumes too much CPU time. Best practices include optimizing code, reducing loops, and using asynchronous processing.

  • Avoid using nested loops and optimize code for better performance

  • Use asynchronous processing like @future or Queueable to offload CPU intensive tasks

  • Limit the use of SOQL queries inside loops to reduce CPU consumption

Add your answer

Q32. Write a SOQL query to fetch the values of description field from the Account. Why does "the description field cannot be filtered in the query call"?

Ans.

SOQL query to fetch description field from Account and reason for inability to filter

  • SOQL query: SELECT Description FROM Account

  • Description field is not filterable because it is a long text field

  • Long text fields cannot be filtered in SOQL queries

Add your answer

Q33. What's the use of @track decorator. Is it mandatory to explicitly use it? If yes, for which use case?

Ans.

The @track decorator in Salesforce is used to track changes to a property in a Lightning web component.

  • Used to make a property reactive and trigger re-renders when its value changes

  • Not mandatory but recommended for properties that need to be reactive

  • Use @track when you want changes to a property to be reflected in the UI

Add your answer

Q34. How will you create a custom adobe Form and assign it to output type?

Ans.

To create a custom Adobe Form and assign it to an output type in SAP ABAP, you can use transaction code SFP.

  • Create a custom Adobe Form using transaction code SFP

  • Assign the Adobe Form to an output type in transaction code NACE

  • Configure the output type to use the custom Adobe Form

  • Test the output type to ensure the custom Adobe Form is being used

Add your answer

Q35. How to installing the application in your client system

Add your answer

Q36. What is selenium and what sort of applications we use this for?

Ans.

Selenium is a popular open-source tool used for automating web browsers.

  • Selenium is used for automating web application testing.

  • It supports multiple programming languages like Java, Python, C#, etc.

  • Selenium can interact with different browsers like Chrome, Firefox, Safari, etc.

  • It can automate repetitive tasks such as form filling, clicking buttons, navigating through web pages, etc.

  • Selenium is widely used in software development for regression testing and functional testing.

Add your answer

Q37. if disk is full what will u do?

Ans.

Free up disk space by identifying and removing unnecessary files.

  • Identify large files and delete them

  • Remove old log files

  • Clear cache and temporary files

  • Compress large files

  • Move files to another disk or server

Add your answer

Q38. What is Wcag 2.2 ? What more new guidelines it has

Ans.

WCAG 2.2 is the latest version of Web Content Accessibility Guidelines with new guidelines for making web content more accessible.

  • WCAG 2.2 includes 9 new success criteria and updates to existing ones

  • New success criteria include requirements for mobile accessibility, contrast, and language clarity

  • WCAG 2.2 also emphasizes the need for accessibility in emerging technologies like virtual and augmented reality

  • WCAG 2.2 is not yet an official standard, but is in draft form for publi...read more

Add your answer

Q39. what version of redhat have you worked on?

Ans.

I have worked on Red Hat Enterprise Linux versions 6, 7, and 8.

  • I have experience with installation, configuration, and maintenance of Red Hat Enterprise Linux servers.

  • I have worked with Red Hat Enterprise Linux 6, 7, and 8 in both physical and virtual environments.

  • I have experience with package management, user management, and security hardening on Red Hat Enterprise Linux.

  • I have also worked with Red Hat Satellite for patch management and automation.

  • Examples of projects I hav...read more

Add your answer

Q40. ICD 10 cm full form and format

Ans.

ICD 10 cm stands for International Classification of Diseases, 10th Revision, Clinical Modification.

  • ICD 10 cm is a coding system used to classify and code diagnoses, symptoms, and procedures in healthcare.

  • It consists of alphanumeric codes that are used to describe medical conditions and procedures.

  • The format of ICD 10 cm codes is a combination of letters and numbers, with up to 7 characters in length.

  • For example, the code for a heart attack is I21.9.

  • ICD 10 cm is used by healt...read more

View 7 more answers

Q41. How do you implement custom middleware in .net core?

Ans.

Custom middleware in .NET Core can be implemented by creating a class that implements the IMiddleware interface and adding it to the application pipeline.

  • Create a class that implements the IMiddleware interface

  • Implement the InvokeAsync method in the middleware class to handle the request processing logic

  • Add the custom middleware to the application pipeline in the Configure method of the Startup class

Add your answer

Q42. What is Test Prioritization and How we apply to our Test Case?

Ans.

Test prioritization is the process of determining the order in which tests should be executed based on their importance and risk.

  • Tests are prioritized based on their impact on the system and the likelihood of failure.

  • Prioritization helps to ensure that critical defects are identified and fixed early in the testing process.

  • Factors such as business requirements, user expectations, and regulatory compliance are considered when prioritizing tests.

  • Test cases with high priority are...read more

Add your answer

Q43. what is the difference between zombie and orphan?

Ans.

Zombie is a terminated process that still has an entry in the process table, while orphan is a child process whose parent has terminated.

  • Zombie process is waiting for its parent to read its exit status

  • Orphan process is adopted by init process (PID 1)

  • Zombie process can be removed by killing its parent process

  • Orphan process can continue running even after its parent has terminated

Add your answer

Q44. What is Networking how dns cluster works in Linux?

Ans.

Networking is the practice of connecting devices to share resources. DNS cluster in Linux is a group of DNS servers that work together.

  • Networking involves connecting devices to share resources such as files, printers, and internet access.

  • DNS cluster in Linux is a group of DNS servers that work together to provide high availability and load balancing for DNS queries.

  • DNS cluster can be configured using tools like BIND and PowerDNS.

  • DNS cluster can improve the performance and rel...read more

Add your answer

Q45. What checks did you perform any network device down ?

Ans.

I perform various checks to identify the cause of network device down.

  • Check if the device is powered on and connected to the network

  • Ping the device to see if it responds

  • Check the device logs for any errors or warnings

  • Check the network switch to see if the port is active

  • Check if there are any network outages or maintenance scheduled

  • Contact the device owner or vendor for further assistance

Add your answer

Q46. 1)What is switch? 2)What is the use of switch? 3)In which layer switch will be work? 4)Which is the difference between router and switch? 5)what are the type of cables?

Add your answer

Q47. -How do you import roles in GRC?

Ans.

Roles can be imported in GRC using the Role Upload functionality.

  • Navigate to Access Management > Role Upload

  • Select the system and upload the role file in CSV format

  • Map the fields and validate the data

  • Submit the job for import

Add your answer

Q48. 1)What is the main function of router ? 2) In which layer router will be work? 3)what is Mack address? 4) what is IP and type of IP?

Add your answer

Q49. What is AD? What is Bitlocker? What is SCCM?

Ans.

AD stands for Active Directory, a directory service developed by Microsoft for managing network resources.

  • AD is used to store information about network objects such as users, computers, and groups.

  • It provides centralized authentication and authorization services for network resources.

  • AD uses a hierarchical structure with domains, trees, and forests.

  • It allows administrators to manage and control access to resources in a network environment.

  • Examples of AD tasks include user acc...read more

Add your answer

Q50. Draft email to the customer for delay in Service Delivery

Ans.

Draft email to customer for delay in service delivery

  • Apologize for the delay and explain the reason

  • Provide a new estimated delivery date

  • Offer compensation or discount for the inconvenience caused

  • Assure the customer that steps are being taken to avoid such delays in future

  • End the email with a positive note and thank the customer for their patience

Add your answer

Q51. How you deploying the window patch

Add your answer

Q52. How to handle scenario where you need to fetch deatils from infinite scrolling table and what condition will you stop the execution

Ans.

To handle fetching details from infinite scrolling table, implement lazy loading and set a condition to stop execution based on scroll position or data availability.

  • Implement lazy loading to fetch data as user scrolls down the table

  • Set a condition to stop execution based on scroll position or reaching end of data

  • Use intersection observer to detect when the table is in view and trigger data fetching

  • Consider implementing a 'Load More' button to control data fetching manually

Add your answer

Q53. What will be the troubleshooting steps if a Monitor is not working?

Ans.

Troubleshooting steps for a non-working monitor

  • Check power connection and ensure monitor is plugged in

  • Verify monitor is turned on and brightness settings are adjusted

  • Try connecting monitor to a different power source or computer

  • Check for loose cables or damaged ports

  • Restart computer and check display settings

Add your answer

Q54. Program for pattern printing ,bubble sort

Ans.

Program to print a pattern and implement bubble sort on an array of strings.

  • For pattern printing, use nested loops to print the desired pattern.

  • For bubble sort, compare adjacent elements and swap if necessary.

  • Use a loop to iterate through the array until no more swaps are needed.

View 1 answer

Q55. How to get the 5th top position data in Sql?

Ans.

Use the OFFSET and FETCH clauses in SQL to get the 5th top position data.

  • Use the ORDER BY clause to sort the data in descending order.

  • Use the OFFSET clause to skip the first 4 rows.

  • Use the FETCH clause to retrieve only the next row after skipping the first 4 rows.

Add your answer

Q56. what is IP and how IP address is represented

Ans.

IP stands for Internet Protocol. An IP address is a unique numerical label assigned to each device connected to a computer network.

  • IP stands for Internet Protocol

  • IP address is a unique numerical label assigned to devices on a network

  • IP addresses are represented in decimal format, such as 192.168.1.1

  • There are two versions of IP addresses - IPv4 and IPv6

Add your answer

Q57. What is the difference between Citrix and VPN?

Ans.

Citrix is a software platform used for virtualization and remote access, while VPN is a secure network connection that allows users to access a private network remotely.

  • Citrix is a software platform that provides virtualization and remote access solutions.

  • VPN (Virtual Private Network) is a secure network connection that allows users to access a private network remotely.

  • Citrix is often used for accessing applications and desktops remotely, while VPN is used for securely connec...read more

View 1 answer

Q58. Explain me what is network bonding?

Ans.

Network bonding is the process of combining multiple network interfaces into a single logical interface.

  • Network bonding provides redundancy and increased bandwidth.

  • There are different bonding modes such as active-backup, balance-rr, and LACP.

  • Bonding can be configured using the ifenslave utility or through network configuration files.

  • Examples of network interfaces that can be bonded include Ethernet, Wi-Fi, and InfiniBand.

  • Bonding can be used in high availability setups or for ...read more

Add your answer

Q59. Do you have experience in handling L1 related tickets for Storage/Backup?

Ans.

Yes, I have experience in handling L1 related tickets for Storage/Backup.

  • Yes, I have experience in resolving L1 related tickets for Storage/Backup.

  • I have worked on troubleshooting storage and backup issues at the L1 level.

  • I am familiar with common storage and backup solutions and their troubleshooting methods.

Add your answer

Q60. Can you tell me where do we use procurement in our daily life

Add your answer

Q61. What is difference between switch and router

Ans.

Switch is used to connect devices within a network, while a router is used to connect different networks.

  • Switch operates at the data link layer of the OSI model, while router operates at the network layer.

  • Switch forwards data packets based on MAC addresses, while router forwards packets based on IP addresses.

  • Switch is typically used in LANs to create a network segment, while router is used to connect multiple networks.

  • Switch provides high-speed data transfer within a network,...read more

View 2 more answers

Q62. How will you perform accessibility testing

Ans.

I will perform accessibility testing by using both manual and automated testing methods.

  • Conduct manual testing to evaluate accessibility features such as keyboard navigation, color contrast, and screen reader compatibility

  • Use automated testing tools like Axe, Wave, and Lighthouse to identify accessibility issues

  • Collaborate with developers and designers to ensure accessibility is integrated throughout the development process

  • Refer to accessibility guidelines such as WCAG 2.1 to...read more

Add your answer

Q63. what are the key configuration steps involved to create Automatic payment program

Ans.

Key configuration steps for creating Automatic payment program in SAP Fico

  • Define payment methods in transaction code FBZP

  • Set up house banks in transaction code FI12

  • Configure payment methods per company code in transaction code FBZP

  • Define payment methods per country in transaction code OBVC4

  • Assign payment methods to vendors in transaction code XK02

Add your answer

Q64. -Difference between SU24, SU25 and SU22?

Ans.

SU22 is used to maintain authorization defaults, SU24 is used to maintain authorization checks, and SU25 is used to maintain the upgrade of authorization objects.

  • SU22 is used to set default values for authorization fields

  • SU24 is used to maintain authorization checks for transactions and reports

  • SU25 is used to maintain the upgrade of authorization objects during system upgrades

  • All three transactions are used in SAP to manage authorizations and ensure system security

Add your answer

Q65. 1.Explain yourself? 2. What framework are you working on? 3. What are different types of waits?

Ans.

I am an automation test engineer with experience in working on various frameworks and implementing different types of waits.

  • I have experience in working on frameworks like Selenium, Appium, TestNG, and JUnit.

  • I have implemented different types of waits like implicit wait, explicit wait, and fluent wait.

  • Implicit wait is used to wait for a certain amount of time before throwing an exception if the element is not found.

  • Explicit wait is used to wait for a certain condition to occu...read more

Add your answer

Q66. Explain Authentication & Authorization in asp.net core?

Ans.

Authentication verifies the identity of a user, while authorization determines what resources a user can access.

  • Authentication confirms the identity of a user through credentials like username and password.

  • Authorization determines the permissions and access levels of a user based on their authenticated identity.

  • In ASP.NET Core, authentication is handled through middleware like Identity, OAuth, or JWT tokens.

  • Authorization in ASP.NET Core is managed through policies and roles d...read more

Add your answer

Q67. Which type is VPN using your client

Add your answer

Q68. What is Stack and Pre and post Tree formation

Ans.

Stack is a data structure that follows LIFO. Pre and post tree formation are methods of traversing a tree.

  • Stack is used for backtracking, undoing, and recursion.

  • Pre-order traversal visits the root node first, then left subtree, then right subtree.

  • Post-order traversal visits the left subtree, then right subtree, then root node.

View 1 answer

Q69. what do you know about cloud computing

Ans.

Cloud computing is the delivery of computing services over the internet, including storage, servers, databases, networking, software, and analytics.

  • Cloud computing allows users to access and use resources on-demand without the need for physical infrastructure.

  • It offers scalability, flexibility, cost-effectiveness, and increased efficiency.

  • Examples of cloud computing services include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.

View 1 answer

Q70. What are the troubleshooting steps if the Monitor is not working?

Ans.

Troubleshooting steps for a non-working monitor

  • Check if the monitor is properly connected to the power source

  • Ensure the monitor's power button is turned on

  • Inspect the video cable connection between the monitor and the computer

  • Try using a different video cable or port

  • Restart the computer to see if the issue is resolved

Add your answer

Q71. If a user reports that SAP system is slow, what would you check?

Ans.

I would check various components to identify the root cause of the slowness in the SAP system.

  • Check system resources such as CPU, memory, and disk usage

  • Review SAP performance logs and traces for any errors or bottlenecks

  • Monitor network connectivity between the user and the SAP system

  • Check for any recent changes or updates that may have impacted system performance

Add your answer

Q72. What is the main thing that you focused when compared to quality and quantity?

Ans.

I prioritize quality over quantity as it leads to better outcomes and higher customer satisfaction.

  • Quality is essential for ensuring patient safety and positive health outcomes

  • Focusing on quality can lead to higher customer satisfaction and loyalty

  • Quantity may lead to burnout and decreased quality of care

  • Examples: spending more time with patients to ensure their needs are met, prioritizing thorough documentation to ensure accuracy and completeness

Add your answer

Q73. Do you know what is KYC? Do you know what is AML? Will you relocate? Will you flexible in rotational shifts?

Ans.

KYC stands for Know Your Customer and AML stands for Anti-Money Laundering. Yes, I am willing to relocate and flexible in rotational shifts.

  • KYC is a process of verifying the identity of customers to prevent fraud and money laundering.

  • AML is a set of laws, regulations, and procedures to prevent criminals from disguising illegally obtained funds as legitimate income.

  • I am willing to relocate for the job if required.

  • I am flexible in working rotational shifts to meet the job requi...read more

Add your answer

Q74. 1. What are Derivatives 2. What is Reconciliation 3. How will you reconcile discrepancies

Ans.

Derivatives are financial contracts that derive their value from an underlying asset. Reconciliation is the process of comparing two sets of records to ensure they are in agreement.

  • Derivatives are used to manage risk or speculate on price movements of an underlying asset

  • Reconciliation involves comparing two sets of records to identify and resolve discrepancies

  • Discrepancies can be reconciled by identifying the root cause and taking corrective action

  • Examples of derivatives incl...read more

Add your answer

Q75. What is Multi Factor Authentication?

Ans.

Multi Factor Authentication is a security process that requires users to provide two or more forms of identification to access a system.

  • It adds an extra layer of security to prevent unauthorized access

  • Examples include using a password and a fingerprint scan or a security token and a PIN

  • It can be used for online banking, email, and other sensitive accounts

Add your answer

Q76. What is your current CTC and expected CTC?

Ans.

My current CTC is $50,000 and I am expecting a 10% increase in my next role.

  • Current CTC: $50,000

  • Expected CTC: 10% increase

  • Open to negotiation based on job responsibilities and benefits

Add your answer

Q77. Can we perform DML operation on UDF function?

Ans.

No, DML operations cannot be performed on UDF functions.

  • UDF functions are read-only and cannot modify the data in the database.

  • DML operations can only be performed on tables or views.

  • UDF functions can be used in SELECT statements to retrieve data.

  • Examples of UDF functions include string manipulation, date calculations, and mathematical operations.

Add your answer

Q78. How many years of experience do you have in Vmware?

Ans.

I have 5 years of experience in Vmware.

  • I have worked with Vmware for 5 years in various roles.

  • I have experience in Vmware virtualization, networking, and storage.

  • I have implemented Vmware solutions for multiple clients.

  • I have completed Vmware certifications to enhance my skills.

Add your answer

Q79. Where are Logic App logs stored?

Ans.

Logic App logs are stored in Azure Monitor Logs (formerly known as Log Analytics).

  • Logic App logs are stored in Azure Monitor Logs, which is a centralized log storage and analytics service in Azure.

  • Logs can be viewed and analyzed using Azure Monitor Logs queries.

  • Logs can also be integrated with other Azure services for monitoring and alerting purposes.

Add your answer

Q80. Select a.*,b.* From employee a,Employee2 b? Output please...

Ans.

SQL query to select all columns from two tables.

  • Use SELECT statement to select columns from tables.

  • Use aliases to differentiate columns from different tables.

  • Separate table names with comma in FROM clause.

Add your answer

Q81. How the report got posted from concur to sap Types of payment structure Tcodes which is used for manul entry postings etc

Ans.

The report is posted from Concur to SAP using Tcodes for manual entry postings.

  • Reports are exported from Concur in a format compatible with SAP

  • The Tcode FB01 is used for manual entry postings in SAP

  • Different payment structures can be set up in SAP depending on the organization's needs

Add your answer

Q82. What wete the mode if communication between devices in the product you worked.

Ans.

The mode of communication between devices in the product I worked on was primarily through Bluetooth technology.

  • Bluetooth technology was used for wireless communication between devices

  • Devices were paired using Bluetooth to establish a connection

  • Data transfer and communication between devices were facilitated through Bluetooth

  • Examples: connecting a smartphone to a smartwatch, pairing a wireless keyboard with a computer

Add your answer

Q83. what is sticky bit and sgid?

Ans.

Sticky bit and SGID are special permissions in Linux file system.

  • Sticky bit is denoted by 't' in file permission and restricts deletion of files in a directory by non-owners.

  • SGID is denoted by 's' in file permission and sets the group ID of newly created files to the group of the parent directory.

  • SGID can also be used on executable files to allow users to run them with the permissions of the group that owns the file.

  • SGID can be set on directories to ensure that newly created ...read more

Add your answer

Q84. TCD is based on what criteria?

Ans.

TCD is based on the criteria of time, cost, and deliverables.

  • TCD stands for Time, Cost, and Deliverables.

  • It is a project management approach that focuses on these three criteria.

  • The goal is to complete the project within the given time and budget while delivering the desired results.

  • For example, if a software development project is using TCD, the team will prioritize tasks based on their impact on time, cost, and deliverables.

  • This approach helps to ensure that the project sta...read more

Add your answer

Q85. Debug the following code: var a=10; function abc() { console.log(a); var a=2; } abc();

Ans.

The code will output 'undefined' because variable 'a' is hoisted within the function.

  • Variable 'a' is hoisted to the top of the function scope, so when 'console.log(a)' is called, 'a' is undefined.

  • To fix this, move the declaration of 'var a=2;' above the 'console.log(a);' statement.

Add your answer

Q86. What is the SP3 Architecture of Palo Alto Firewalls?

Ans.

SP3 Architecture of Palo Alto Firewalls refers to Security Processing Plane, Control Plane, and Data Plane.

  • SP3 Architecture consists of Security Processing Plane (SP), Control Plane (C), and Data Plane (D)

  • Security Processing Plane (SP) handles security functions like threat prevention and decryption

  • Control Plane (C) manages routing and firewall policies

  • Data Plane (D) processes and forwards traffic based on firewall policies

  • SP3 Architecture helps in efficient and effective net...read more

Add your answer

Q87. How to break a page based on condition?

Ans.

Use the command 'NEW-PAGE' to break a page based on condition in SAP ABAP.

  • Use the command 'NEW-PAGE' followed by a condition to break a page in SAP ABAP.

  • Example: NEW-PAGE TITLE 'New Page Title'.

  • Example: NEW-PAGE TITLE 'New Page Title' AT LINE-SELECTION.

Add your answer

Q88. how do you review your code before sharing with Peer Review.

Ans.

I review my code by conducting thorough testing, following coding standards, and using code analysis tools.

  • Conduct thorough testing to identify and fix any bugs or issues.

  • Follow coding standards to ensure consistency and readability.

  • Use code analysis tools to check for potential errors or inefficiencies.

  • Seek feedback from colleagues or mentors for additional insights.

Add your answer

Q89. What is Active Directory

Ans.

Active Directory is a directory service that stores information about network resources and enables centralized management.

  • Active Directory is a Microsoft technology used in Windows-based networks.

  • It provides a centralized database for managing users, computers, and other network resources.

  • Active Directory uses a hierarchical structure with domains, trees, and forests.

  • It allows for authentication, authorization, and access control to network resources.

  • Active Directory enables...read more

View 1 answer

Q90. What problems do you see in Indian banks that can be technically addresses.

Ans.

Indian banks face several technical problems that need to be addressed.

  • Outdated technology infrastructure

  • Inadequate cybersecurity measures

  • Lack of interoperability between different banking systems

  • Inefficient data management and analytics

  • Limited adoption of digital banking solutions

  • Inadequate customer support and grievance redressal mechanisms

Add your answer

Q91. What are different types of api methods have you used and where

Ans.

I have used various types of API methods including GET, POST, PUT, and DELETE.

  • GET method is used to retrieve data from a server. For example, I have used GET method to fetch user information from a user API endpoint.

  • POST method is used to send data to a server to create a new resource. I have used POST method to create new records in a database through API calls.

  • PUT method is used to update existing data on a server. For instance, I have used PUT method to update user informa...read more

Add your answer

Q92. Explain session management in asp.net core?

Ans.

Session management in ASP.NET Core involves storing and retrieving user-specific data during a user's visit to a website.

  • Session data is stored on the server side by default in ASP.NET Core

  • Session data can be accessed and manipulated using the HttpContext.Session property

  • Session data can be configured to use different storage providers such as in-memory, distributed cache, or SQL Server

  • Session data is typically used to store user-specific information like user ID, shopping ca...read more

Add your answer

Q93. Design a react app to fetch and display data from an api.

Ans.

Design a React app to fetch and display data from an API.

  • Create a React component to fetch data from the API using fetch or axios

  • Use state to store the fetched data and update the component's UI

  • Render the data in the component's JSX to display it on the screen

Add your answer

Q94. Explain how you plan the Test Cycle Schedule?

Ans.

Test cycle schedule is planned by considering project timelines, test objectives, resources, and risks.

  • Identify project timelines and milestones

  • Define test objectives and scope

  • Allocate resources and identify dependencies

  • Identify and prioritize risks

  • Create a detailed test plan and schedule

  • Review and adjust the schedule as needed

Add your answer

Q95. Can we call future method from batch class

Ans.

Yes, future methods can be called from a batch class in Salesforce.

  • Future methods can be called from batch classes to perform asynchronous processing.

  • This can be useful for offloading long-running tasks to future methods to avoid hitting governor limits.

  • Example: Calling a future method from a batch class to update records in Salesforce asynchronously.

Add your answer

Q96. What is the relation temperature, current and resistance?

Ans.

Temperature affects resistance, which in turn affects current flow in a circuit.

  • As temperature increases, resistance typically increases as well.

  • Higher resistance leads to lower current flow in a circuit.

  • Conversely, lower resistance results in higher current flow.

  • Ohm's Law (V = I * R) describes the relationship between current, voltage, and resistance in a circuit.

Add your answer

Q97. Describe OOP's concepts Difference between throw and throws compile time and runtime polymorphism static methods Exception Handling Program to find occurrences of characters in a string

Ans.

OOP's concepts include encapsulation, inheritance, polymorphism, and abstraction.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit.

  • Inheritance: Allowing a class to inherit properties and behavior from another class.

  • Polymorphism: Ability to present the same interface for different data types.

  • Abstraction: Hiding the complex implementation details and showing only the necessary features.

Add your answer

Q98. What is EiGRP variance, route inflence EIGRP, Route Reflector

Ans.

EIGRP variance is used to load balance traffic across unequal cost paths. Route influence EIGRP is used to manipulate the metric of a route. Route Reflector is used in BGP to reduce the number of iBGP peerings.

  • EIGRP variance is used to balance traffic across multiple paths with different costs

  • Route influence EIGRP is used to manipulate the metric of a route to influence the path selection

  • Route Reflector is used in BGP to reduce the number of iBGP peerings by reflecting routes...read more

Add your answer

Q99. Return type of patial view and render partial view?

Ans.

Partial view returns HTML string while render partial view writes directly to response stream.

  • Partial view returns HTML string that can be used in the main view

  • Render partial view writes directly to response stream

  • Partial view can be used to render reusable components

  • Render partial view can be used to render a partial view without a layout

Add your answer

Q100. What do you know about NTT Data?

Ans.

NTT Data is a global IT services company providing consulting, application services, and infrastructure services.

  • NTT Data is a subsidiary of Nippon Telegraph and Telephone Corporation, a Japanese telecommunications company.

  • It offers a wide range of services including consulting, application development, and infrastructure management.

  • NTT Data has a presence in over 50 countries and serves clients in various industries such as healthcare, finance, and manufacturing.

  • The company ...read more

Add your answer
1
2
3
4
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at null

based on 254 interviews in the last 1 year
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.2
 • 384 Interview Questions
3.9
 • 202 Interview Questions
3.8
 • 169 Interview Questions
3.9
 • 151 Interview Questions
4.3
 • 135 Interview Questions
View all
Top NTT Data Information Processing Services Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter