NTT Data Information Processing Services
100+ Acurus Solutions Interview Questions and Answers
Q1. On an average, how many invoices can you process in a day?
I can process around 50-60 invoices per day depending on the complexity.
The number of invoices processed can vary based on the complexity of the invoices.
I have experience in using various invoice processing software which helps in increasing the efficiency.
I prioritize the invoices based on their due dates and ensure timely processing.
Q2. What is ost and pst in Outlook, what is distribution list and mailbox, how to create new data file in Outlook, how to fix bsod issue in windows OS, what is bios and key to enter in bios, what is office 365, dif...
read moreQuestions related to Outlook, Windows OS, and Office 365.
OST and PST are file formats used by Outlook to store data.
Distribution list is a group of email addresses used for sending emails to multiple recipients.
Mailbox is a storage location for emails and other data in Outlook.
To create a new data file in Outlook, go to File > New > Outlook Data File.
BSOD issue in Windows OS can be fixed by updating drivers or running system diagnostics.
BIOS is a firmware that initializes har...read more
Q3. What is the KPI in your organisation?
The KPI in our organization is customer satisfaction.
Customer satisfaction is measured through surveys and feedback.
We track the percentage of satisfied customers on a monthly basis.
We also monitor the number of customer complaints and aim to reduce them.
Improving customer satisfaction is a key focus for our team.
Q4. What is the difference between SLA and TAT?
SLA stands for Service Level Agreement, while TAT stands for Turnaround Time.
SLA is a contractual agreement between a service provider and a customer, defining the level of service expected.
TAT refers to the time taken to complete a specific task or process.
SLA focuses on the quality and availability of services, while TAT focuses on the speed of completing tasks.
SLA is usually measured in terms of percentage uptime or response time, while TAT is measured in hours, minutes, o...read more
Q5. What is the TAT for processing an invoice?
The TAT for processing an invoice varies depending on the complexity of the invoice and the company's internal processes.
The TAT can range from a few days to several weeks.
Factors that can affect the TAT include the accuracy of the invoice, the approval process, and the payment terms.
Automating the invoice processing system can help reduce the TAT and improve efficiency.
Regularly reviewing and optimizing the invoice processing system can also help reduce the TAT.
It is importa...read more
Q6. Explain me Raid? how many raid are there? which raid is best to use?
RAID stands for Redundant Array of Independent Disks. It is a data storage technology that combines multiple physical disks into a single logical unit.
There are several types of RAID, including RAID 0, RAID 1, RAID 5, RAID 6, RAID 10, and more.
RAID 0 offers no redundancy but provides improved performance by striping data across multiple disks.
RAID 1 provides mirroring of data across two disks, offering redundancy but no performance improvement.
RAID 5 uses striping with parity...read more
Q7. How to raise the ticket , which type of ticket portal you are using
Q8. How to identify the cost of ospf ? What are the bgp attributes? How stp works
Identifying OSPF cost, BGP attributes, and STP working
OSPF cost is calculated based on the bandwidth of the link
BGP attributes include AS path, next hop, local preference, etc.
STP works by selecting a root bridge and blocking redundant paths
OSPF cost can be manually configured using the 'ip ospf cost' command
BGP attributes are used to determine the best path for routing
STP uses BPDU messages to exchange information and build a loop-free topology
Q9. Performance of virtual machine ( from VC, ESXtop), critical issue faced, Dvswitch/standard switch difference, Network security/teaming policy, full scenario for PSC, Virtual center upgrade and what ever you men...
read moreThe question covers various aspects of virtual machine performance, network security, and upgrades.
Virtual machine performance can be monitored using tools like VC and ESXtop.
Critical issues faced can include resource contention, network congestion, and storage latency.
Dvswitch and standard switch have differences in terms of features and capabilities.
Network security can be ensured through policies like teaming and VLANs.
PSC and Virtual Center upgrades require careful planni...read more
Q10. A scrum master in Agile is equivalent to which position in water fall?
Scrum Master in Agile is equivalent to Project Manager in Waterfall.
Scrum Master is responsible for facilitating the Agile process and ensuring the team follows it.
Project Manager is responsible for managing the project from start to finish in Waterfall.
Both roles involve managing the team and ensuring the project is completed on time and within budget.
However, the approach and methodology used are different in Agile and Waterfall.
Q11. Select columnname as 1 from employee table,Output if employee table contain 100 record?
The question is asking to select a column named 'columnname' as '1' from the employee table and provide the output if the table contains 100 records.
The column 'columnname' does not exist in the employee table, so the query will result in an error.
The value '1' will be selected for each record in the employee table, resulting in 100 rows with the value '1'.
The output will be a single column with 100 rows, all containing the value '1'.
Q12. What is jvm,jdk,jre Finall, finally, finalize key words String, string builder, string buffer, Code output Difference between hash map,hast set Advantages of array list and linked list And program Oops concepts...
read moreJava Developer interview questions covering JVM, keywords, data structures, OOPs concepts, and Java features.
JVM is Java Virtual Machine that executes Java bytecode
JDK is Java Development Kit that includes JRE and development tools
JRE is Java Runtime Environment that provides runtime environment for Java programs
finally block is used to execute code after try-catch block
finalize method is called by garbage collector before object is destroyed
String is immutable, StringBuilder...read more
Q13. What is service management? How do you handle escalations and difficult customers? What is a Service Level Agreement (SLA), and what are the different types of SLAs? Current job responsibilities and deliverable...
read moreService management involves handling customer escalations, ensuring SLAs are met, and delivering high-quality service.
Service management involves overseeing the delivery of services to customers, ensuring their needs are met and issues are resolved efficiently.
Handling escalations involves addressing customer complaints or issues that have not been resolved through regular channels, and finding solutions to satisfy the customer.
Dealing with difficult customers requires patien...read more
Q14. Which type of email client is using in your company
Q15. What if product owner adds a user story in the middle of the sprint ?
It is not recommended to add user stories in the middle of the sprint.
Product owner should be advised to wait until the next sprint planning meeting to add the user story.
If the user story is critical, the team should discuss and decide if it can be accommodated within the current sprint.
Adding user stories in the middle of the sprint can disrupt the team's focus and impact the sprint goal.
The Scrum Master should facilitate a discussion with the team and product owner to dete...read more
Q16. if disk is full what will u do?
Free up disk space by identifying and removing unnecessary files.
Identify large files and delete them
Remove old log files
Clear cache and temporary files
Compress large files
Move files to another disk or server
Q17. what version of redhat have you worked on?
I have worked on Red Hat Enterprise Linux versions 6, 7, and 8.
I have experience with installation, configuration, and maintenance of Red Hat Enterprise Linux servers.
I have worked with Red Hat Enterprise Linux 6, 7, and 8 in both physical and virtual environments.
I have experience with package management, user management, and security hardening on Red Hat Enterprise Linux.
I have also worked with Red Hat Satellite for patch management and automation.
Examples of projects I hav...read more
Q18. what is the difference between zombie and orphan?
Zombie is a terminated process that still has an entry in the process table, while orphan is a child process whose parent has terminated.
Zombie process is waiting for its parent to read its exit status
Orphan process is adopted by init process (PID 1)
Zombie process can be removed by killing its parent process
Orphan process can continue running even after its parent has terminated
Q19. How to installing the application in your client system
Q20. What is Wcag 2.2 ? What more new guidelines it has
WCAG 2.2 is the latest version of Web Content Accessibility Guidelines with new guidelines for making web content more accessible.
WCAG 2.2 includes 9 new success criteria and updates to existing ones
New success criteria include requirements for mobile accessibility, contrast, and language clarity
WCAG 2.2 also emphasizes the need for accessibility in emerging technologies like virtual and augmented reality
WCAG 2.2 is not yet an official standard, but is in draft form for publi...read more
Q21. How do you implement custom middleware in .net core?
Custom middleware in .NET Core can be implemented by creating a class that implements the IMiddleware interface and adding it to the application pipeline.
Create a class that implements the IMiddleware interface
Implement the InvokeAsync method in the middleware class to handle the request processing logic
Add the custom middleware to the application pipeline in the Configure method of the Startup class
Q22. What is Test Prioritization and How we apply to our Test Case?
Test prioritization is the process of determining the order in which tests should be executed based on their importance and risk.
Tests are prioritized based on their impact on the system and the likelihood of failure.
Prioritization helps to ensure that critical defects are identified and fixed early in the testing process.
Factors such as business requirements, user expectations, and regulatory compliance are considered when prioritizing tests.
Test cases with high priority are...read more
Q23. What is Networking how dns cluster works in Linux?
Networking is the practice of connecting devices to share resources. DNS cluster in Linux is a group of DNS servers that work together.
Networking involves connecting devices to share resources such as files, printers, and internet access.
DNS cluster in Linux is a group of DNS servers that work together to provide high availability and load balancing for DNS queries.
DNS cluster can be configured using tools like BIND and PowerDNS.
DNS cluster can improve the performance and rel...read more
Q24. What is the difference between Citrix and VPN?
Citrix is a software platform used for virtualization and remote access, while VPN is a secure network connection that allows users to access a private network remotely.
Citrix is a software platform that provides virtualization and remote access solutions.
VPN (Virtual Private Network) is a secure network connection that allows users to access a private network remotely.
Citrix is often used for accessing applications and desktops remotely, while VPN is used for securely connec...read more
Q25. Explain me what is network bonding?
Network bonding is the process of combining multiple network interfaces into a single logical interface.
Network bonding provides redundancy and increased bandwidth.
There are different bonding modes such as active-backup, balance-rr, and LACP.
Bonding can be configured using the ifenslave utility or through network configuration files.
Examples of network interfaces that can be bonded include Ethernet, Wi-Fi, and InfiniBand.
Bonding can be used in high availability setups or for ...read more
Q26. Draft email to the customer for delay in Service Delivery
Draft email to customer for delay in service delivery
Apologize for the delay and explain the reason
Provide a new estimated delivery date
Offer compensation or discount for the inconvenience caused
Assure the customer that steps are being taken to avoid such delays in future
End the email with a positive note and thank the customer for their patience
Q27. How you deploying the window patch
Q28. How to get the 5th top position data in Sql?
Use the OFFSET and FETCH clauses in SQL to get the 5th top position data.
Use the ORDER BY clause to sort the data in descending order.
Use the OFFSET clause to skip the first 4 rows.
Use the FETCH clause to retrieve only the next row after skipping the first 4 rows.
Q29. What is your current CTC and expected CTC?
My current CTC is $50,000 and I am expecting a 10% increase in my next role.
Current CTC: $50,000
Expected CTC: 10% increase
Open to negotiation based on job responsibilities and benefits
Q30. Can we perform DML operation on UDF function?
No, DML operations cannot be performed on UDF functions.
UDF functions are read-only and cannot modify the data in the database.
DML operations can only be performed on tables or views.
UDF functions can be used in SELECT statements to retrieve data.
Examples of UDF functions include string manipulation, date calculations, and mathematical operations.
Q31. Select a.*,b.* From employee a,Employee2 b? Output please...
SQL query to select all columns from two tables.
Use SELECT statement to select columns from tables.
Use aliases to differentiate columns from different tables.
Separate table names with comma in FROM clause.
Q32. How will you perform accessibility testing
I will perform accessibility testing by using both manual and automated testing methods.
Conduct manual testing to evaluate accessibility features such as keyboard navigation, color contrast, and screen reader compatibility
Use automated testing tools like Axe, Wave, and Lighthouse to identify accessibility issues
Collaborate with developers and designers to ensure accessibility is integrated throughout the development process
Refer to accessibility guidelines such as WCAG 2.1 to...read more
Q33. what are the key configuration steps involved to create Automatic payment program
Key configuration steps for creating Automatic payment program in SAP Fico
Define payment methods in transaction code FBZP
Set up house banks in transaction code FI12
Configure payment methods per company code in transaction code FBZP
Define payment methods per country in transaction code OBVC4
Assign payment methods to vendors in transaction code XK02
Q34. what is sticky bit and sgid?
Sticky bit and SGID are special permissions in Linux file system.
Sticky bit is denoted by 't' in file permission and restricts deletion of files in a directory by non-owners.
SGID is denoted by 's' in file permission and sets the group ID of newly created files to the group of the parent directory.
SGID can also be used on executable files to allow users to run them with the permissions of the group that owns the file.
SGID can be set on directories to ensure that newly created ...read more
Q35. Explain Authentication & Authorization in asp.net core?
Authentication verifies the identity of a user, while authorization determines what resources a user can access.
Authentication confirms the identity of a user through credentials like username and password.
Authorization determines the permissions and access levels of a user based on their authenticated identity.
In ASP.NET Core, authentication is handled through middleware like Identity, OAuth, or JWT tokens.
Authorization in ASP.NET Core is managed through policies and roles d...read more
Q36. Which type is VPN using your client
Q37. Design a react app to fetch and display data from an api.
Design a React app to fetch and display data from an API.
Create a React component to fetch data from the API using fetch or axios
Use state to store the fetched data and update the component's UI
Render the data in the component's JSX to display it on the screen
Q38. Describe OOP's concepts Difference between throw and throws compile time and runtime polymorphism static methods Exception Handling Program to find occurrences of characters in a string
OOP's concepts include encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Inheritance: Allowing a class to inherit properties and behavior from another class.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation details and showing only the necessary features.
Q39. Where are Logic App logs stored?
Logic App logs are stored in Azure Monitor Logs (formerly known as Log Analytics).
Logic App logs are stored in Azure Monitor Logs, which is a centralized log storage and analytics service in Azure.
Logs can be viewed and analyzed using Azure Monitor Logs queries.
Logs can also be integrated with other Azure services for monitoring and alerting purposes.
Q40. Return type of patial view and render partial view?
Partial view returns HTML string while render partial view writes directly to response stream.
Partial view returns HTML string that can be used in the main view
Render partial view writes directly to response stream
Partial view can be used to render reusable components
Render partial view can be used to render a partial view without a layout
Q41. What do you know about NTT Data?
NTT Data is a global IT services company providing consulting, application services, and infrastructure services.
NTT Data is a subsidiary of Nippon Telegraph and Telephone Corporation, a Japanese telecommunications company.
It offers a wide range of services including consulting, application development, and infrastructure management.
NTT Data has a presence in over 50 countries and serves clients in various industries such as healthcare, finance, and manufacturing.
The company ...read more
Q42. What is bdc and how many type
BDC stands for Batch Data Communication. It is a method used in SAP ABAP to transfer data from external systems to SAP.
BDC is used to automate the process of data entry in SAP.
There are two types of BDC: Classic BDC and Call Transaction Method.
Classic BDC involves creating a batch input session and processing it using transaction codes.
Call Transaction Method uses the CALL TRANSACTION statement to directly process data without creating a session.
BDC is commonly used for tasks...read more
Q43. TCD is based on what criteria?
TCD is based on the criteria of time, cost, and deliverables.
TCD stands for Time, Cost, and Deliverables.
It is a project management approach that focuses on these three criteria.
The goal is to complete the project within the given time and budget while delivering the desired results.
For example, if a software development project is using TCD, the team will prioritize tasks based on their impact on time, cost, and deliverables.
This approach helps to ensure that the project sta...read more
Q44. Explain booting process?
Booting process is the sequence of events that occur when a computer system is turned on.
BIOS/UEFI firmware initializes hardware components
Bootloader loads the kernel into memory
Kernel initializes system processes and drivers
Init system starts user space processes and services
Graphical user interface (GUI) is loaded for user interaction
Q45. how do you review your code before sharing with Peer Review.
I review my code by conducting thorough testing, following coding standards, and using code analysis tools.
Conduct thorough testing to identify and fix any bugs or issues.
Follow coding standards to ensure consistency and readability.
Use code analysis tools to check for potential errors or inefficiencies.
Seek feedback from colleagues or mentors for additional insights.
Q46. Explain session management in asp.net core?
Session management in ASP.NET Core involves storing and retrieving user-specific data during a user's visit to a website.
Session data is stored on the server side by default in ASP.NET Core
Session data can be accessed and manipulated using the HttpContext.Session property
Session data can be configured to use different storage providers such as in-memory, distributed cache, or SQL Server
Session data is typically used to store user-specific information like user ID, shopping ca...read more
Q47. Explain how you plan the Test Cycle Schedule?
Test cycle schedule is planned by considering project timelines, test objectives, resources, and risks.
Identify project timelines and milestones
Define test objectives and scope
Allocate resources and identify dependencies
Identify and prioritize risks
Create a detailed test plan and schedule
Review and adjust the schedule as needed
Q48. What is EiGRP variance, route inflence EIGRP, Route Reflector
EIGRP variance is used to load balance traffic across unequal cost paths. Route influence EIGRP is used to manipulate the metric of a route. Route Reflector is used in BGP to reduce the number of iBGP peerings.
EIGRP variance is used to balance traffic across multiple paths with different costs
Route influence EIGRP is used to manipulate the metric of a route to influence the path selection
Route Reflector is used in BGP to reduce the number of iBGP peerings by reflecting routes...read more
Q49. What are pointers in java language?
Pointers in Java are variables that store memory addresses of other variables or objects.
Pointers in Java are not directly supported like in languages such as C or C++.
Instead, Java uses references to objects, which act like pointers but with restrictions.
Example: String str = new String("Hello"); // str is a reference to the String object
Q50. difference between systemd and services?
systemd is a system and service manager while services are individual programs that run in the background.
systemd is responsible for managing the system's startup and shutdown processes
services are individual programs that run in the background and can be managed by systemd
systemd can start, stop, restart, enable, and disable services
services can be configured to start automatically at boot time using systemd
systemd provides better logging and error reporting for services com...read more
Q51. How to troubleshoot outlook issues?
To troubleshoot Outlook issues, check for connectivity, repair the application, and recreate the profile.
Check internet connectivity and server status
Repair the Outlook application using the built-in repair tool
Recreate the Outlook profile
Disable add-ins and antivirus software temporarily
Check for any recent updates or changes made to the system
Clear the Outlook cache
Check for any conflicting software or applications
Contact IT support if issue persists
Q52. How do you estimate user stories
User story estimation is done using relative sizing and team consensus.
Use story points to estimate complexity and effort
Relative sizing is used to compare user stories
Team consensus is important for accurate estimation
Estimation should be done by the entire team, including developers and stakeholders
Q53. What does backlog mean?
Backlog is a list of tasks or requirements that need to be completed in a project.
Backlog is a prioritized list of work items
It includes user stories, bugs, and technical tasks
It is constantly updated throughout the project
It helps the team to plan and track progress
Examples: JIRA, Trello, Asana
Q54. Network call flows and interfaces in 2G,3G4G and IMS
Understanding network call flows and interfaces is crucial for testing 2G, 3G, 4G, and IMS technologies.
2G call flow involves circuit-switched technology and uses GSM architecture
3G call flow involves packet-switched technology and uses UMTS architecture
4G call flow involves all-IP technology and uses LTE architecture
IMS call flow involves VoIP technology and uses SIP protocol
Interfaces include RAN, Core Network, and IMS
Testing involves verifying call setup, handovers, and da...read more
Q55. Sorting program without using any in built functions
Implement a sorting program without using any built-in functions
Iterate through the array and compare each element with the rest to sort
Use a sorting algorithm like bubble sort, selection sort, or insertion sort
Implement the sorting logic using loops and conditional statements
Q56. What is Active Directory Federation Service
Active Directory Federation Service (AD FS) is a feature in Windows Server that allows for single sign-on authentication across multiple systems.
AD FS allows users to access multiple applications with a single set of credentials
It enables secure sharing of identity information between trusted partners
AD FS uses claims-based authentication to verify user identity
It supports integration with cloud-based services like Office 365
Q57. Project management life cycle What is admin account in AD What is OU
Admin account in AD is a privileged account with full control over Active Directory. OU stands for Organizational Unit, a container object in AD.
Admin account has full control over AD objects and can perform any action on them
OU is a container object used to organize and manage AD objects
OU can be used to delegate administrative control over specific objects to non-administrative users
Example: Sales OU can contain all user accounts and resources related to the sales departmen...read more
Q58. How to debug smartform
To debug a smartform, use transaction SMARTFORMS and set breakpoints in the code.
Open transaction SMARTFORMS
Select the smartform to be debugged
Click on the 'Debugging' button
Set breakpoints in the code
Execute the smartform and the debugger will stop at the breakpoints
Q59. What is the North Bridge ans South Bridge
The North Bridge and South Bridge are components of a computer's motherboard responsible for connecting the CPU, RAM, and other high-speed components.
North Bridge connects the CPU, RAM, and high-speed components directly
South Bridge connects the slower peripheral devices like USB, SATA, and audio controllers
North Bridge and South Bridge work together to facilitate communication between the CPU and other components
Example: In older computers, the North Bridge and South Bridge ...read more
Q60. How do we use Conditional Access in Azure
Conditional Access in Azure is used to control access to resources based on specific conditions.
Conditional Access policies can be set up to require multi-factor authentication for certain users or devices
It can restrict access based on location, device compliance, or other factors
Conditional Access can be used to enforce policies such as requiring a compliant device to access sensitive data
Q61. Diff b/w Virtual and new keyword?
Virtual keyword is used for method overriding while new keyword is used for hiding base class member.
Virtual keyword is used to allow a derived class to override a method in the base class.
New keyword is used to hide a base class member in the derived class.
Virtual keyword is used with the base class method while new keyword is used with the derived class method.
Virtual keyword is used for runtime polymorphism while new keyword is used for compile-time polymorphism.
Q62. What are backups? what are ports?
Backups are copies of data that can be used to restore the original data in case of data loss or corruption. Ports are communication endpoints used for network connections.
Backups are essential for data recovery in case of disasters or system failures
Ports are identified by numbers and are used to establish connections between devices
Common ports include HTTP (80), HTTPS (443), SSH (22), FTP (21), etc.
Q63. Do you know excel microsoft
Yes, I know Excel Microsoft.
I am proficient in using Excel for data analysis and reporting.
I have experience in creating pivot tables, charts, and graphs.
I am familiar with advanced functions such as VLOOKUP, IF, and SUMIF.
I have used Excel for budgeting, forecasting, and project management.
I am comfortable working with large datasets and can manipulate data using filters and sorting.
Q64. What are the structure of O365 and it’s function
O365 is a cloud-based subscription service that provides access to various Microsoft applications and services.
O365 includes applications such as Outlook, Word, Excel, PowerPoint, and OneNote.
It also includes cloud services such as OneDrive, SharePoint, Teams, and Yammer.
The structure of O365 is based on a subscription model, where users pay a monthly or yearly fee to access the applications and services.
O365 allows for collaboration and communication among users, with featur...read more
Q65. roles and responsibilities ,how to reslove the laptop issues
Q66. What is method hiding?
Method hiding is a technique in object-oriented programming where a subclass provides a method with the same name as a method in its superclass.
Method hiding is also known as static polymorphism or compile-time polymorphism.
It allows a subclass to provide its own implementation of a method without affecting the superclass's implementation.
The method in the subclass must have the same name and signature as the method in the superclass.
Method hiding is achieved by using the 'ne...read more
Q67. What is test NG annotation, Can you define priority 0
TestNG annotation is used in TestNG framework to provide additional information about test methods or classes.
TestNG annotations are used to control the execution flow of test methods.
They can be used to set the priority of test methods, define dependencies, configure test groups, etc.
Examples of TestNG annotations include @Test, @BeforeMethod, @AfterMethod, @DataProvider, etc.
Q68. Advantages of Agile Methodology
Agile methodology allows for flexibility, collaboration, and faster delivery of high-quality software.
Encourages customer involvement and feedback throughout the development process
Allows for changes and adjustments to be made quickly and efficiently
Promotes teamwork and communication among team members
Delivers working software in shorter timeframes
Reduces the risk of project failure
Increases customer satisfaction
Examples: Scrum, Kanban, Extreme Programming (XP)
Q69. Explain the Defect Life Cycle and its Categories?
Defect Life Cycle is a process followed by testers to identify, report, and resolve defects in software.
Defect is identified and reported by tester
Defect is reviewed by development team
Defect is assigned to a developer for fixing
Defect is fixed by developer
Defect is retested by tester
Defect is closed if it passes retest, else reopened
Categories include New, Open, In Progress, Fixed, Reopened, Closed
Q70. What is the complex integration you did?
I led a complex integration project between two large financial institutions to streamline their data sharing processes.
Designed a custom API to facilitate real-time data exchange between the systems
Implemented data mapping and transformation logic to ensure compatibility between the different data formats
Worked closely with both technical teams to troubleshoot and resolve integration issues
Developed a comprehensive testing plan to validate the integration and ensure data acc...read more
Q71. What actions I have used fromDWPC
I have used actions from DWPC to integrate systems and streamline processes.
Implemented data mapping and transformation using DWPC
Automated data transfer between different systems
Configured workflows to trigger actions based on specific events
Monitored system integrations for errors and performance issues
Q72. What is User Acceptance Testing?
User Acceptance Testing (UAT) is the final phase of testing where end-users test the software to ensure it meets their requirements.
UAT is performed by end-users or business representatives
It is done in a real-world environment
The focus is on validating the software's functionality and usability
UAT is conducted after all other testing phases are completed
Defects found during UAT are reported and fixed before the software is released
Q73. Tell about the process
The process involves planning, executing, and evaluating tasks to achieve a specific goal.
Identify the goal or objective of the process
Plan the steps needed to achieve the goal
Execute the planned steps
Evaluate the outcome to determine success or areas for improvement
Q74. Define one body system like urinary, digestive
The respiratory system is responsible for breathing and gas exchange.
Includes organs such as the lungs, trachea, and bronchi
Works to bring oxygen into the body and remove carbon dioxide
Can be affected by diseases such as asthma and pneumonia
Q75. Validation of data between source and target
Validation of data between source and target is a crucial step in ETL process.
Compare the data types and formats of source and target data
Check for missing or extra data in target
Verify data transformation rules are applied correctly
Perform data profiling to identify anomalies
Use checksums or hash values to ensure data integrity
Q76. What are screen Reader modes
Screen Reader modes are different ways in which a screen reader can read and interpret content on a webpage.
Screen Reader modes can include reading the entire page, reading only headings or links, or reading specific sections of the page.
Screen Reader modes can also include different levels of verbosity, such as reading only the most important information or providing detailed descriptions of all content.
Examples of screen reader modes include NVDA's browse mode, JAWS' virtua...read more
Q77. How will you Schedule Jobs using TWS in Mainframe
Scheduling jobs using TWS in Mainframe involves creating job definitions, specifying dependencies, setting up schedules, and monitoring job execution.
Create job definitions with specific parameters and requirements
Specify job dependencies to ensure proper sequencing
Set up schedules for job execution based on time, frequency, or event triggers
Monitor job execution and troubleshoot any issues that arise
Q78. Why bgp used, state, LP and weight, med
BGP is used for routing between autonomous systems. LP and weight are used for path selection. MED is used for path advertisement.
BGP is used for inter-domain routing between autonomous systems.
LP (Local Preference) is used to select the preferred path among multiple paths within the same AS.
Weight is a Cisco proprietary parameter used to select the preferred path among multiple paths within the same AS.
MED (Multi-Exit Discriminator) is used to influence the path selection in...read more
Q79. Difference between Problem and Incident
Problem is the underlying cause of one or more incidents, while an incident is an event that disrupts normal service operation.
A problem is a root cause of one or more incidents, while an incident is a disruption of normal service operation.
Problems are identified through multiple incidents, while incidents are reported as soon as they occur.
Problems require investigation and resolution, while incidents require immediate action to restore service.
Examples of problems include ...read more
Q80. Complexity of the algorithm
Complexity of an algorithm refers to the amount of resources required to execute it.
Complexity can be measured in terms of time and space complexity.
Time complexity refers to the number of operations required to execute the algorithm.
Space complexity refers to the amount of memory required to execute the algorithm.
Common time complexities include O(1), O(log n), O(n), O(n log n), O(n^2), O(2^n), O(n!).
Optimizing algorithms for lower complexity can improve performance and scal...read more
Q81. Networking and difference between UDP AND TCP
UDP and TCP are protocols used in networking. UDP is faster but less reliable, while TCP is slower but more reliable.
UDP stands for User Datagram Protocol and is connectionless
TCP stands for Transmission Control Protocol and is connection-oriented
UDP is faster because it doesn't establish a connection before sending data
TCP is more reliable because it ensures all data is received and in the correct order
UDP is used for applications where speed is more important than reliabili...read more
Q82. Spark internal working and optimization techniques
Spark internal working and optimization techniques
Spark uses Directed Acyclic Graph (DAG) for optimizing workflows
Lazy evaluation helps in optimizing transformations by combining them into a single stage
Caching and persistence of intermediate results can improve performance
Partitioning data can help in parallel processing and reducing shuffle operations
Q83. Quick troubleshooting for admins like SCCM, AD and Azure
Quick troubleshooting tips for SCCM, AD, and Azure
Check event logs for errors or warnings
Verify network connectivity
Restart services related to the issue
Check permissions and group memberships
Review SCCM logs for client issues
Use Azure Resource Health for Azure service status
Check AD replication status
Q84. Explain about VLAN and how it works?
VLAN is a virtual LAN that separates network traffic based on logical grouping, improving network security and performance.
VLANs divide a physical network into multiple logical networks, allowing for better traffic management.
Devices within the same VLAN can communicate directly with each other, while devices in different VLANs require a router to communicate.
VLANs can be configured based on port, MAC address, or protocol.
Example: VLAN 10 for finance department, VLAN 20 for m...read more
Q85. Explain about Table B components in MDM scoresheet?
Q86. What is CUCM, CUC, Regarding Networking.
CUCM and CUC are networking technologies used for communication and collaboration.
CUCM stands for Cisco Unified Communications Manager and is a call processing software used for IP telephony.
CUC stands for Cisco Unity Connection and is a voicemail and unified messaging platform.
Both technologies are used for communication and collaboration in a networked environment.
They are commonly used in enterprise environments for managing and routing calls and messages.
CUCM and CUC are ...read more
Q87. What is ost a file?
An OST file is an offline storage table file used by Microsoft Outlook to store a copy of mailbox data from an Exchange server.
OST files allow users to access their mailbox data even when offline
Changes made to an OST file while offline will sync with the Exchange server once online
OST files can be created when using Outlook in Cached Exchange Mode
Q88. What is entry criteria & exit criteria
Entry criteria and exit criteria are conditions that must be met before and after testing, respectively.
Entry criteria are the conditions that must be fulfilled before testing can begin
Exit criteria are the conditions that must be fulfilled before testing can be considered complete
Entry criteria can include having test data ready, test environment set up, and test cases prepared
Exit criteria can include all test cases executed, all defects fixed, and test reports generated
Q89. Explanation (to customer) for missed SLA
The explanation should include the reason for the delay and steps taken to prevent it in the future.
Acknowledge the missed SLA and apologize for the inconvenience caused to the customer.
Explain the reason for the delay, whether it was due to unforeseen circumstances or internal issues.
Provide assurance that steps have been taken to prevent such delays in the future.
Offer a solution or compensation to the customer if possible.
Thank the customer for their patience and understan...read more
Q90. write a flowchart for a given problem statement
Flowchart for a given problem statement
Start with the beginning of the process
Define decision points and actions
Use appropriate symbols for processes, decisions, and terminators
Connect the symbols with arrows to show the flow of the process
Include loops or repetitions if necessary
Q91. What are Azure Security Policies
Azure Security Policies are a set of rules and configurations that help enforce security controls within Azure environments.
Azure Security Policies help ensure compliance with security standards and best practices
They can be used to enforce specific security configurations, such as requiring encryption for storage accounts
Policies can be assigned at the subscription, resource group, or resource level
Q92. Q.2) Golden rules of accounting?
Golden rules of accounting are basic principles to maintain financial records accurately.
Debit the receiver, credit the giver
Debit what comes in, credit what goes out
Debit all expenses and losses, credit all incomes and gains
Q93. What are service value system?
A service value system is a framework that defines the values, principles, and practices that guide an organization in delivering value to its customers.
Defines the values, principles, and practices of an organization
Guides the organization in delivering value to customers
Helps in aligning the organization's goals with customer needs
Q94. How many expenser
The number of expensers is not specified in the question.
The question does not provide any specific information about the number of expensers.
It is unclear what is meant by 'expenser' without further context or clarification.
Q95. What is bgp and working
BGP (Border Gateway Protocol) is a routing protocol used to exchange routing information between different networks on the internet.
BGP is used by internet service providers to make routing decisions.
It operates on TCP port 179.
BGP uses path attributes to determine the best route to a destination.
BGP can be configured in different ways such as eBGP (external BGP) and iBGP (internal BGP).
Q96. What is ITIL Process.
Q97. What is Protocol in swift?
Protocols in Swift define a blueprint of methods, properties, and other requirements that a class, struct, or enum must adopt.
Protocols are used to define a set of rules or capabilities that a type must conform to.
They allow for code reuse and provide a way to define common behavior across different types.
A type can adopt multiple protocols, enabling it to conform to multiple sets of rules.
Protocols can require properties, methods, initializers, and associated types.
They can ...read more
Q98. What is Dependency Injection.?
Dependency Injection is a design pattern where the dependencies of an object are provided externally rather than being created internally.
Dependency Injection helps in achieving loose coupling between classes.
It allows for easier testing and maintenance of code.
There are three types of Dependency Injection: Constructor Injection, Setter Injection, and Interface Injection.
Example: In iOS development, we can use Dependency Injection to inject dependencies like network clients, ...read more
Q99. What is Generics in swift.?
Generics in Swift allow you to write flexible and reusable code by creating functions, classes, and structures that can work with any type.
Generics enable you to write code that can be used with different types, without duplicating code.
You can define generic functions, types, and protocols to work with a wide range of types.
Generics are particularly useful when working with collections, such as arrays and dictionaries.
They allow you to write generic algorithms that can opera...read more
Q100. What is Associate types ?
Associate types are a way to create a relationship between two types in Swift.
Associate types are defined using the 'associatedtype' keyword.
They are used in protocols to define a placeholder type that will be specified by the conforming type.
The conforming type can provide its own concrete type for the associated type.
This allows protocols to be more flexible and reusable.
For example, a protocol for a container type can have an associated type for the type of elements it con...read more
Top HR Questions asked in Acurus Solutions
Interview Process at Acurus Solutions
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month