NTT Data Information Processing Services
40+ Crayon Software Experts India Interview Questions and Answers
Q1. On an average, how many invoices can you process in a day?
I can process around 50-60 invoices per day depending on the complexity.
The number of invoices processed can vary based on the complexity of the invoices.
I have experience in using various invoice processing software which helps in increasing the efficiency.
I prioritize the invoices based on their due dates and ensure timely processing.
Q2. What is the KPI in your organisation?
The KPI in our organization is customer satisfaction.
Customer satisfaction is measured through surveys and feedback.
We track the percentage of satisfied customers on a monthly basis.
We also monitor the number of customer complaints and aim to reduce them.
Improving customer satisfaction is a key focus for our team.
Q3. What is the difference between SLA and TAT?
SLA stands for Service Level Agreement, while TAT stands for Turnaround Time.
SLA is a contractual agreement between a service provider and a customer, defining the level of service expected.
TAT refers to the time taken to complete a specific task or process.
SLA focuses on the quality and availability of services, while TAT focuses on the speed of completing tasks.
SLA is usually measured in terms of percentage uptime or response time, while TAT is measured in hours, minutes, o...read more
Q4. What is the TAT for processing an invoice?
The TAT for processing an invoice varies depending on the complexity of the invoice and the company's internal processes.
The TAT can range from a few days to several weeks.
Factors that can affect the TAT include the accuracy of the invoice, the approval process, and the payment terms.
Automating the invoice processing system can help reduce the TAT and improve efficiency.
Regularly reviewing and optimizing the invoice processing system can also help reduce the TAT.
It is importa...read more
Q5. Select columnname as 1 from employee table,Output if employee table contain 100 record?
The question is asking to select a column named 'columnname' as '1' from the employee table and provide the output if the table contains 100 records.
The column 'columnname' does not exist in the employee table, so the query will result in an error.
The value '1' will be selected for each record in the employee table, resulting in 100 rows with the value '1'.
The output will be a single column with 100 rows, all containing the value '1'.
Q6. Performance of virtual machine ( from VC, ESXtop), critical issue faced, Dvswitch/standard switch difference, Network security/teaming policy, full scenario for PSC, Virtual center upgrade and what ever you men...
read moreThe question covers various aspects of virtual machine performance, network security, and upgrades.
Virtual machine performance can be monitored using tools like VC and ESXtop.
Critical issues faced can include resource contention, network congestion, and storage latency.
Dvswitch and standard switch have differences in terms of features and capabilities.
Network security can be ensured through policies like teaming and VLANs.
PSC and Virtual Center upgrades require careful planni...read more
Q7. What is service management? How do you handle escalations and difficult customers? What is a Service Level Agreement (SLA), and what are the different types of SLAs? Current job responsibilities and deliverable...
read moreService management involves handling customer escalations, ensuring SLAs are met, and delivering high-quality service.
Service management involves overseeing the delivery of services to customers, ensuring their needs are met and issues are resolved efficiently.
Handling escalations involves addressing customer complaints or issues that have not been resolved through regular channels, and finding solutions to satisfy the customer.
Dealing with difficult customers requires patien...read more
Q8. How to identify the cost of ospf ? What are the bgp attributes? How stp works
Identifying OSPF cost, BGP attributes, and STP working
OSPF cost is calculated based on the bandwidth of the link
BGP attributes include AS path, next hop, local preference, etc.
STP works by selecting a root bridge and blocking redundant paths
OSPF cost can be manually configured using the 'ip ospf cost' command
BGP attributes are used to determine the best path for routing
STP uses BPDU messages to exchange information and build a loop-free topology
Q9. Draft email to the customer for delay in Service Delivery
Draft email to customer for delay in service delivery
Apologize for the delay and explain the reason
Provide a new estimated delivery date
Offer compensation or discount for the inconvenience caused
Assure the customer that steps are being taken to avoid such delays in future
End the email with a positive note and thank the customer for their patience
Q10. What checks did you perform any network device down ?
I perform various checks to identify the cause of network device down.
Check if the device is powered on and connected to the network
Ping the device to see if it responds
Check the device logs for any errors or warnings
Check the network switch to see if the port is active
Check if there are any network outages or maintenance scheduled
Contact the device owner or vendor for further assistance
Q11. Can we perform DML operation on UDF function?
No, DML operations cannot be performed on UDF functions.
UDF functions are read-only and cannot modify the data in the database.
DML operations can only be performed on tables or views.
UDF functions can be used in SELECT statements to retrieve data.
Examples of UDF functions include string manipulation, date calculations, and mathematical operations.
Q12. Select a.*,b.* From employee a,Employee2 b? Output please...
SQL query to select all columns from two tables.
Use SELECT statement to select columns from tables.
Use aliases to differentiate columns from different tables.
Separate table names with comma in FROM clause.
Q13. Return type of patial view and render partial view?
Partial view returns HTML string while render partial view writes directly to response stream.
Partial view returns HTML string that can be used in the main view
Render partial view writes directly to response stream
Partial view can be used to render reusable components
Render partial view can be used to render a partial view without a layout
Q14. 1. What are Derivatives 2. What is Reconciliation 3. How will you reconcile discrepancies
Derivatives are financial contracts that derive their value from an underlying asset. Reconciliation is the process of comparing two sets of records to ensure they are in agreement.
Derivatives are used to manage risk or speculate on price movements of an underlying asset
Reconciliation involves comparing two sets of records to identify and resolve discrepancies
Discrepancies can be reconciled by identifying the root cause and taking corrective action
Examples of derivatives incl...read more
Q15. Network call flows and interfaces in 2G,3G4G and IMS
Understanding network call flows and interfaces is crucial for testing 2G, 3G, 4G, and IMS technologies.
2G call flow involves circuit-switched technology and uses GSM architecture
3G call flow involves packet-switched technology and uses UMTS architecture
4G call flow involves all-IP technology and uses LTE architecture
IMS call flow involves VoIP technology and uses SIP protocol
Interfaces include RAN, Core Network, and IMS
Testing involves verifying call setup, handovers, and da...read more
Q16. What are strength and weakness?
Strengths are positive attributes that contribute to success, while weaknesses are areas that need improvement.
Strengths: leadership skills, attention to detail, problem-solving abilities
Weaknesses: public speaking, time management, delegation
Examples: Strength - ability to motivate team members; Weakness - tendency to procrastinate
Q17. Project management life cycle What is admin account in AD What is OU
Admin account in AD is a privileged account with full control over Active Directory. OU stands for Organizational Unit, a container object in AD.
Admin account has full control over AD objects and can perform any action on them
OU is a container object used to organize and manage AD objects
OU can be used to delegate administrative control over specific objects to non-administrative users
Example: Sales OU can contain all user accounts and resources related to the sales departmen...read more
Q18. Diff b/w Virtual and new keyword?
Virtual keyword is used for method overriding while new keyword is used for hiding base class member.
Virtual keyword is used to allow a derived class to override a method in the base class.
New keyword is used to hide a base class member in the derived class.
Virtual keyword is used with the base class method while new keyword is used with the derived class method.
Virtual keyword is used for runtime polymorphism while new keyword is used for compile-time polymorphism.
Q19. What is method hiding?
Method hiding is a technique in object-oriented programming where a subclass provides a method with the same name as a method in its superclass.
Method hiding is also known as static polymorphism or compile-time polymorphism.
It allows a subclass to provide its own implementation of a method without affecting the superclass's implementation.
The method in the subclass must have the same name and signature as the method in the superclass.
Method hiding is achieved by using the 'ne...read more
Q20. What do you know about NTT Data
NTT Data is a global IT services company providing consulting, application services, and business process outsourcing.
NTT Data is a subsidiary of Nippon Telegraph and Telephone Corporation, a Japanese telecommunications company.
They offer a wide range of services including consulting, application development, and business process outsourcing.
NTT Data has a global presence with offices in over 50 countries.
They have expertise in various industries such as healthcare, finance, ...read more
Q21. What are the bgp state's?
BGP states are the different stages a BGP session goes through during establishment and maintenance.
BGP Idle state
BGP Connect state
BGP Active state
BGP OpenSent state
BGP OpenConfirm state
BGP Established state
Q22. Difference between Problem and Incident
Problem is the underlying cause of one or more incidents, while an incident is an event that disrupts normal service operation.
A problem is a root cause of one or more incidents, while an incident is a disruption of normal service operation.
Problems are identified through multiple incidents, while incidents are reported as soon as they occur.
Problems require investigation and resolution, while incidents require immediate action to restore service.
Examples of problems include ...read more
Q23. Diff between shared mail box and distribution list
Shared mailbox is used for multiple users to access and manage emails, while distribution list is used to send emails to a group of recipients.
Shared mailbox allows multiple users to access and manage emails in a single mailbox.
Distribution list is used to send emails to a group of recipients by using a single email address.
Shared mailbox is typically used for collaboration within a team or department.
Distribution list is commonly used for sending announcements or updates to ...read more
Q24. write a flowchart for a given problem statement
Flowchart for a given problem statement
Start with the beginning of the process
Define decision points and actions
Use appropriate symbols for processes, decisions, and terminators
Connect the symbols with arrows to show the flow of the process
Include loops or repetitions if necessary
Q25. What are account type s on fico?
Account types in FICO include asset accounts, liability accounts, equity accounts, revenue accounts, and expense accounts.
Asset accounts represent resources owned by the company, such as cash, inventory, and equipment.
Liability accounts represent obligations owed by the company, such as loans and accounts payable.
Equity accounts represent the owner's stake in the company.
Revenue accounts track income generated by the company, such as sales revenue.
Expense accounts track costs...read more
Q26. Explanation (to customer) for missed SLA
The explanation should include the reason for the delay and steps taken to prevent it in the future.
Acknowledge the missed SLA and apologize for the inconvenience caused to the customer.
Explain the reason for the delay, whether it was due to unforeseen circumstances or internal issues.
Provide assurance that steps have been taken to prevent such delays in the future.
Offer a solution or compensation to the customer if possible.
Thank the customer for their patience and understan...read more
Q27. What are production management?
Production management involves planning, organizing, directing, and controlling the production process to ensure efficient and effective operations.
Planning and scheduling production activities
Managing resources such as labor, materials, and equipment
Ensuring quality control and meeting production targets
Implementing and improving production processes
Managing budgets and costs
Coordinating with other departments such as sales and marketing
Ensuring compliance with safety and en...read more
Q28. Why bgp used, state, LP and weight, med
BGP is used for routing between autonomous systems. LP and weight are used for path selection. MED is used for path advertisement.
BGP is used for inter-domain routing between autonomous systems.
LP (Local Preference) is used to select the preferred path among multiple paths within the same AS.
Weight is a Cisco proprietary parameter used to select the preferred path among multiple paths within the same AS.
MED (Multi-Exit Discriminator) is used to influence the path selection in...read more
Q29. Quick troubleshooting for admins like SCCM, AD and Azure
Quick troubleshooting tips for SCCM, AD, and Azure
Check event logs for errors or warnings
Verify network connectivity
Restart services related to the issue
Check permissions and group memberships
Review SCCM logs for client issues
Use Azure Resource Health for Azure service status
Check AD replication status
Q30. Why are joining NTT DATA?
NTT DATA is a leading global IT services provider with a strong focus on innovation and customer satisfaction.
I am joining NTT DATA because of their reputation as a top IT services provider
I am excited about the opportunity to work with a company that values innovation and customer satisfaction
NTT DATA's commitment to diversity and inclusion aligns with my personal values
I am impressed with NTT DATA's global presence and the opportunity to work on projects with a global impac...read more
Q31. What are service value system?
A service value system is a framework that defines the values, principles, and practices that guide an organization in delivering value to its customers.
Defines the values, principles, and practices of an organization
Guides the organization in delivering value to customers
Helps in aligning the organization's goals with customer needs
Q32. What is VPN
A VPN, or Virtual Private Network, is a secure connection that allows users to access the internet privately and securely.
Creates a secure encrypted connection over a less secure network, such as the internet
Helps protect sensitive data and online privacy
Allows users to access restricted websites or content
Commonly used by remote workers to securely connect to their company's network
Q33. Complexity of the algorithm
Complexity of an algorithm refers to the amount of resources required to execute it.
Complexity can be measured in terms of time and space complexity.
Time complexity refers to the number of operations required to execute the algorithm.
Space complexity refers to the amount of memory required to execute the algorithm.
Common time complexities include O(1), O(log n), O(n), O(n log n), O(n^2), O(2^n), O(n!).
Optimizing algorithms for lower complexity can improve performance and scal...read more
Q34. Data Migration in Teamcenter platform.
Data migration in Teamcenter platform involves transferring data from one system to another while ensuring data integrity and accuracy.
Understand the data structure and relationships in the current system
Plan the migration process including data extraction, transformation, and loading
Perform data validation and testing to ensure successful migration
Consider data security and compliance during the migration process
Utilize tools and scripts for efficient data migration
Examples:...read more
Q35. What is cyber kill chain
Cyber kill chain is a framework used to describe the stages of a cyber attack from initial reconnaissance to data exfiltration.
Cyber kill chain consists of several stages including reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.
Each stage represents a step in the attacker's process of infiltrating a target network and achieving their goals.
Understanding the cyber kill chain can help organizations identify an...read more
Q36. What is defect life cycle
Defect life cycle is the process of identifying, reporting, prioritizing, fixing, and verifying defects in software development.
Defect is identified by testers during testing
Defect is reported to the development team
Development team prioritizes and fixes the defect
Fixed defect is verified by testers
Defect is closed if it passes verification or reopened if it fails
Q37. Various types of insurance
Various types of insurance include health, life, auto, home, and disability insurance.
Health insurance covers medical expenses and treatments.
Life insurance provides financial protection to beneficiaries in case of the insured's death.
Auto insurance covers damages and liabilities related to vehicles.
Home insurance protects against damages to the home and belongings.
Disability insurance provides income replacement if the insured is unable to work due to a disability.
Q38. reason for choosing NTT Data
Chose NTT Data for its reputation, global presence, and opportunities for growth.
Reputation for providing innovative solutions in IT services
Global presence with offices in multiple countries
Opportunities for career growth and development
Positive reviews from current employees
Q39. Current CTC EXPECTED CTC,
Current CTC is confidential, Expected CTC is negotiable based on role and responsibilities.
Current CTC is confidential information and not disclosed during interviews.
Expected CTC is based on the seniority of the role, responsibilities, market standards, and negotiation.
I am open to discussing the expected CTC based on the specifics of the role and benefits package.
Q40. Last drawn ctc of the company
I am currently earning a salary of $60,000 per year at my current company.
My last drawn CTC at my current company is $60,000 per year
I am currently earning $5,000 per month at my current job
Q41. What is CIA .
CIA stands for Confidentiality, Integrity, and Availability, which are the three core principles of information security.
Confidentiality: Ensuring that information is only accessible to those who are authorized to view it.
Integrity: Ensuring that information is accurate and has not been tampered with.
Availability: Ensuring that information is accessible when needed by authorized users.
Example: Encrypting sensitive data to maintain confidentiality.
Example: Implementing checksu...read more
Q42. What is big data ?
Q43. Explain p2p process?
P2P process stands for Procure to Pay process, which involves all steps from requisitioning goods/services to making payment.
Requisitioning: Requesting goods/services needed by the organization.
Vendor selection: Choosing a vendor to fulfill the requisition.
Purchase order creation: Formalizing the agreement with the vendor.
Goods receipt: Receiving the goods/services from the vendor.
Invoice verification: Checking the invoice against the purchase order and goods receipt.
Payment ...read more
Q44. Justify position
Senior System Administrator position requires advanced technical skills and experience in managing complex IT systems.
Extensive experience in managing and troubleshooting complex IT systems
Advanced knowledge of network infrastructure and security protocols
Proven track record of implementing and maintaining system backups and disaster recovery plans
Strong communication and problem-solving skills
Ability to work well under pressure and prioritize tasks effectively
Top HR Questions asked in Crayon Software Experts India
Interview Process at Crayon Software Experts India
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month